No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 14 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 13 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Pachno 1.0.6 contains an XML external entity injection vulnerability that allows unauthenticated attackers to read arbitrary files by exploiting unsafe XML parsing in the TextParser helper. Attackers can inject malicious XML entities through wiki table syntax and inline tags in issue descriptions, comments, and wiki articles to trigger entity resolution via simplexml_load_string() without LIBXML_NONET restrictions. | |
| Title | Pachno 1.0.6 Wiki TextParser XML External Entity Injection | |
| First Time appeared |
Pachno
Pachno pachno |
|
| Weaknesses | CWE-403 | |
| CPEs | cpe:2.3:a:pachno:pachno:1.0.6:*:*:*:*:*:*:* | |
| Vendors & Products |
Pachno
Pachno pachno |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-14T16:29:11.810Z
Reserved: 2026-04-08T13:39:22.100Z
Link: CVE-2026-40042
Updated: 2026-04-14T15:27:04.843Z
Status : Received
Published: 2026-04-13T19:16:51.960
Modified: 2026-04-13T19:16:51.960
Link: CVE-2026-40042
No data.
OpenCVE Enrichment
Updated: 2026-04-14T16:33:38Z