{"api_version":"1","generated_at":"2026-04-25T06:51:27+00:00","cve":"CVE-2022-4725","urls":{"html":"https://cve.report/CVE-2022-4725","api":"https://cve.report/api/cve/CVE-2022-4725.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-4725","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-4725"},"summary":{"title":"CVE-2022-4725","description":"A vulnerability was found in AWS SDK 2.59.0. It has been rated as critical. This issue affects the function XpathUtils of the file aws-android-sdk-core/src/main/java/com/amazonaws/util/XpathUtils.java of the component XML Parser. The manipulation leads to server-side request forgery. Upgrading to version 2.59.1 is able to address this issue. The name of the patch is c3e6d69422e1f0c80fe53f2d757b8df97619af2b. It is recommended to upgrade the affected component. The identifier VDB-216737 was assigned to this vulnerability.","state":"PUBLIC","assigner":"cna@vuldb.com","published_at":"2022-12-27 15:15:00","updated_at":"2023-11-07 03:58:00"},"problem_types":["CWE-918"],"metrics":[],"references":[{"url":"https://github.com/aws-amplify/aws-sdk-android/releases/tag/release_v2.59.1","name":"https://github.com/aws-amplify/aws-sdk-android/releases/tag/release_v2.59.1","refsource":"MISC","tags":[],"title":"Release AWS SDK for Android 2.59.1 · aws-amplify/aws-sdk-android · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/aws-amplify/aws-sdk-android/commit/c3e6d69422e1f0c80fe53f2d757b8df97619af2b","name":"https://github.com/aws-amplify/aws-sdk-android/commit/c3e6d69422e1f0c80fe53f2d757b8df97619af2b","refsource":"MISC","tags":[],"title":"fix(core): added fix for xml parser (#3100) · aws-amplify/aws-sdk-android@c3e6d69 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://vuldb.com/?id.216737","name":"https://vuldb.com/?id.216737","refsource":"MISC","tags":[],"title":"CVE-2022-4725 | AWS SDK XML Parser XpathUtils.java XpathUtils server-side request forgery (ID 3100)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/aws-amplify/aws-sdk-android/pull/3100","name":"https://github.com/aws-amplify/aws-sdk-android/pull/3100","refsource":"MISC","tags":[],"title":"fix(core): added fix for xml parser by banji180 · Pull Request #3100 · aws-amplify/aws-sdk-android · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-4725","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-4725","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"4725","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"amazon","cpe5":"aws_software_development_kit","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"android","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2022-4725","ASSIGNER":"cna@vuldb.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A vulnerability was found in AWS SDK 2.59.0. It has been rated as critical. This issue affects the function XpathUtils of the file aws-android-sdk-core/src/main/java/com/amazonaws/util/XpathUtils.java of the component XML Parser. The manipulation leads to server-side request forgery. Upgrading to version 2.59.1 is able to address this issue. The name of the patch is c3e6d69422e1f0c80fe53f2d757b8df97619af2b. It is recommended to upgrade the affected component. The identifier VDB-216737 was assigned to this vulnerability."},{"lang":"deu","value":"Eine Schwachstelle wurde in AWS SDK 2.59.0 ausgemacht. Sie wurde als kritisch eingestuft. Dies betrifft die Funktion XpathUtils der Datei aws-android-sdk-core/src/main/java/com/amazonaws/util/XpathUtils.java der Komponente XML Parser. Durch Manipulation mit unbekannten Daten kann eine server-side request forgery-Schwachstelle ausgenutzt werden. Ein Aktualisieren auf die Version 2.59.1 vermag dieses Problem zu lösen. Der Patch wird als c3e6d69422e1f0c80fe53f2d757b8df97619af2b bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-918 Server-Side Request Forgery","cweId":"CWE-918"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"AWS SDK","version":{"version_data":[{"version_value":"2.59.0","version_affected":"="}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/aws-amplify/aws-sdk-android/pull/3100","refsource":"MISC","name":"https://github.com/aws-amplify/aws-sdk-android/pull/3100"},{"url":"https://github.com/aws-amplify/aws-sdk-android/commit/c3e6d69422e1f0c80fe53f2d757b8df97619af2b","refsource":"MISC","name":"https://github.com/aws-amplify/aws-sdk-android/commit/c3e6d69422e1f0c80fe53f2d757b8df97619af2b"},{"url":"https://vuldb.com/?id.216737","refsource":"MISC","name":"https://vuldb.com/?id.216737"},{"url":"https://github.com/aws-amplify/aws-sdk-android/releases/tag/release_v2.59.1","refsource":"MISC","name":"https://github.com/aws-amplify/aws-sdk-android/releases/tag/release_v2.59.1"}]},"impact":{"cvss":[{"version":"3.1","baseScore":5.5,"vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"},{"version":"3.0","baseScore":5.5,"vectorString":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}]}},"nvd":{"publishedDate":"2022-12-27 15:15:00","lastModifiedDate":"2023-11-07 03:58:00","problem_types":["CWE-918"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:amazon:aws_software_development_kit:*:*:*:*:*:android:*:*","versionEndExcluding":"2.59.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}