{"api_version":"1","generated_at":"2026-04-13T16:54:52+00:00","cve":"CVE-2026-34401","urls":{"html":"https://cve.report/CVE-2026-34401","api":"https://cve.report/api/cve/CVE-2026-34401.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-34401","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-34401"},"summary":{"title":"XML Notepad: XML External Entity (XXE) Injection via Unsafe XmlTextReader in XML Diff and Schema Loading","description":"XML Notepad is a Windows program that provides a simple intuitive User Interface for browsing and editing XML documents. Prior to version 2.9.0.21, XML Notepad does not disable DTD processing by default which means external entities are resolved automatically. There is a well known attack related to malicious DTD files where an attacker to craft a malicious XML file that loads a DTD that causes XML Notepad to make outbound HTTP/SMB requests, potentially leaking local file contents or capturing the victim's NTLM credentials. This issue has been patched in version 2.9.0.21.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-03-31 22:16:18","updated_at":"2026-04-13 15:19:47"},"problem_types":["CWE-611","CWE-611 CWE-611: Improper Restriction of XML External Entity Reference"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"6.5","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"6.5","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","version":"3.1"}}],"references":[{"url":"https://github.com/microsoft/XmlNotepad/security/advisories/GHSA-5j32-486h-42ch","name":"https://github.com/microsoft/XmlNotepad/security/advisories/GHSA-5j32-486h-42ch","refsource":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Mitigation","Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/microsoft/XmlNotepad/commit/3665603d61ba10b7827a3724e854748cb780140c","name":"https://github.com/microsoft/XmlNotepad/commit/3665603d61ba10b7827a3724e854748cb780140c","refsource":"security-advisories@github.com","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/microsoft/XmlNotepad/commit/c03ab2311ac6960452eb1ab49098768f851dcc53","name":"https://github.com/microsoft/XmlNotepad/commit/c03ab2311ac6960452eb1ab49098768f851dcc53","refsource":"security-advisories@github.com","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/microsoft/XmlNotepad/releases/tag/2.9.0.21","name":"https://github.com/microsoft/XmlNotepad/releases/tag/2.9.0.21","refsource":"security-advisories@github.com","tags":["Product","Release Notes"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-34401","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-34401","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"microsoft","product":"XmlNotepad","version":"affected < 2.9.0.21","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2026","cve_id":"34401","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"xml_notepad","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"windows","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"34401","cve":"CVE-2026-34401","epss":"0.002390000","percentile":"0.469300000","score_date":"2026-04-07","updated_at":"2026-04-08 00:03:40"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-34401","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-04-01T15:45:24.184266Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-04-01T15:53:18.538Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"references":[{"tags":["exploit"],"url":"https://github.com/microsoft/XmlNotepad/security/advisories/GHSA-5j32-486h-42ch"}],"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"XmlNotepad","vendor":"microsoft","versions":[{"status":"affected","version":"< 2.9.0.21"}]}],"descriptions":[{"lang":"en","value":"XML Notepad is a Windows program that provides a simple intuitive User Interface for browsing and editing XML documents. Prior to version 2.9.0.21, XML Notepad does not disable DTD processing by default which means external entities are resolved automatically. There is a well known attack related to malicious DTD files where an attacker to craft a malicious XML file that loads a DTD that causes XML Notepad to make outbound HTTP/SMB requests, potentially leaking local file contents or capturing the victim's NTLM credentials. This issue has been patched in version 2.9.0.21."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-611","description":"CWE-611: Improper Restriction of XML External Entity Reference","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-03-31T21:05:50.647Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/microsoft/XmlNotepad/security/advisories/GHSA-5j32-486h-42ch","tags":["x_refsource_CONFIRM"],"url":"https://github.com/microsoft/XmlNotepad/security/advisories/GHSA-5j32-486h-42ch"},{"name":"https://github.com/microsoft/XmlNotepad/commit/3665603d61ba10b7827a3724e854748cb780140c","tags":["x_refsource_MISC"],"url":"https://github.com/microsoft/XmlNotepad/commit/3665603d61ba10b7827a3724e854748cb780140c"},{"name":"https://github.com/microsoft/XmlNotepad/commit/c03ab2311ac6960452eb1ab49098768f851dcc53","tags":["x_refsource_MISC"],"url":"https://github.com/microsoft/XmlNotepad/commit/c03ab2311ac6960452eb1ab49098768f851dcc53"},{"name":"https://github.com/microsoft/XmlNotepad/releases/tag/2.9.0.21","tags":["x_refsource_MISC"],"url":"https://github.com/microsoft/XmlNotepad/releases/tag/2.9.0.21"}],"source":{"advisory":"GHSA-5j32-486h-42ch","discovery":"UNKNOWN"},"title":"XML Notepad: XML External Entity (XXE) Injection via Unsafe XmlTextReader in XML Diff and Schema Loading"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-34401","datePublished":"2026-03-31T21:05:50.647Z","dateReserved":"2026-03-27T13:45:29.620Z","dateUpdated":"2026-04-01T15:53:18.538Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-03-31 22:16:18","lastModifiedDate":"2026-04-13 15:19:47","problem_types":["CWE-611","CWE-611 CWE-611: Improper Restriction of XML External Entity Reference"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:xml_notepad:*:*:*:*:*:windows:*:*","versionEndExcluding":"2.9.0.21","matchCriteriaId":"F08C7164-A566-4527-8764-F9BC54E164F1"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"34401","Ordinal":"1","Title":"XML Notepad: XML External Entity (XXE) Injection via Unsafe XmlT","CVE":"CVE-2026-34401","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"34401","Ordinal":"1","NoteData":"XML Notepad is a Windows program that provides a simple intuitive User Interface for browsing and editing XML documents. Prior to version 2.9.0.21, XML Notepad does not disable DTD processing by default which means external entities are resolved automatically. There is a well known attack related to malicious DTD files where an attacker to craft a malicious XML file that loads a DTD that causes XML Notepad to make outbound HTTP/SMB requests, potentially leaking local file contents or capturing the victim's NTLM credentials. This issue has been patched in version 2.9.0.21.","Type":"Description","Title":"XML Notepad: XML External Entity (XXE) Injection via Unsafe XmlT"}]}}}