Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)
Improper Restriction of XML External Entity Reference
This vulnerability occurs when an application processes XML input without properly restricting external entity references. Attackers can exploit this to read local files, trigger internal network…
What is CWE-611?
Real-world CVEs caused by CWE-611
-
Recruiter software allows reading arbitrary files using XXE
-
A browser control can allow remote attackers to determine the existence of files via Javascript containing XML script.
-
XXE during SVG image conversion
-
XXE in PHP application allows reading the application's configuration file.
-
XXE in database server
-
XXE in rapid web application development framework allows reading arbitrary files.
-
XXE via XML-RPC request.
-
XXE in office document product using RDF.
Step-by-step attacker path
- 1
Identify a code path that handles untrusted input without validation.
- 2
Craft a payload that exercises the unsafe behavior — injection, traversal, overflow, or logic abuse.
- 3
Deliver the payload through a normal request and observe the application's reaction.
- 4
Iterate until the response leaks data, executes attacker code, or escalates privileges.
Vulnerable pseudo
MITRE has not published a code example for this CWE. The pattern below is illustrative — see Resources for canonical references.
// Example pattern — see MITRE for the canonical references.
function handleRequest(input) {
// Untrusted input flows directly into the sensitive sink.
return executeUnsafe(input);
} Secure pseudo
// Validate, sanitize, or use a safe API before reaching the sink.
function handleRequest(input) {
const safe = validateAndEscape(input);
return executeWithGuards(safe);
} How to prevent CWE-611
- Implementation / System Configuration Many XML parsers and validators can be configured to disable external entity expansion.
How to detect CWE-611
Plexicus auto-detects CWE-611 and opens a fix PR in under 60 seconds.
Codex Remedium scans every commit, identifies this exact weakness, and ships a reviewer-ready pull request with the patch. No tickets. No hand-offs.
Frequently asked questions
What is CWE-611?
This vulnerability occurs when an application processes XML input without properly restricting external entity references. Attackers can exploit this to read local files, trigger internal network requests, or cause denial of service.
How serious is CWE-611?
MITRE has not published a likelihood-of-exploit rating for this weakness. Treat it as medium-impact until your threat model proves otherwise.
What languages or platforms are affected by CWE-611?
MITRE lists the following affected platforms: XML, Web Based.
How can I prevent CWE-611?
Many XML parsers and validators can be configured to disable external entity expansion.
How does Plexicus detect and fix CWE-611?
Plexicus's SAST engine matches the data-flow signature for CWE-611 on every commit. When a match is found, our Codex Remedium agent opens a fix PR with the corrected code, tests, and a one-line summary for the reviewer.
Where can I learn more about CWE-611?
MITRE publishes the canonical definition at https://cwe.mitre.org/data/definitions/611.html. You can also reference OWASP and NIST documentation for adjacent guidance.
Weaknesses related to CWE-611
Externally Controlled Reference to a Resource in Another Sphere
This vulnerability occurs when an application uses user-supplied input to reference a resource located outside its intended security…
Improper Restriction of Rendered UI Layers or Frames
This vulnerability occurs when a web application fails to properly control whether its pages can be embedded within frames or UI layers…
External Control of System or Configuration Setting
This vulnerability occurs when an application allows users to directly modify critical system settings or configuration values from an…
Session Fixation
Session fixation occurs when an application authenticates a user without first destroying the previous session ID. This allows an attacker…
Unintended Proxy or Intermediary ('Confused Deputy')
A confused deputy vulnerability occurs when a system receives a request from a client and forwards it to an external destination without…
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
This vulnerability occurs when an application uses unvalidated external input, like a URL parameter or form field, to dynamically decide…
URL Redirection to Untrusted Site ('Open Redirect')
An open redirect vulnerability occurs when a web application uses unvalidated user input to determine the destination of a redirect,…
External Control of File Name or Path
This vulnerability occurs when an application uses unvalidated user input to construct file or directory paths for filesystem operations.
Server-Side Request Forgery (SSRF)
Server-Side Request Forgery (SSRF) occurs when a web application fetches a remote resource based on user-controlled input, but fails to…
Further reading
- MITRE — official CWE-611 https://cwe.mitre.org/data/definitions/611.html
- XML External Entity (XXE) Processing https://www.owasp.org/index.php/XML_External_Entity_(XXE)_Processing
- XML External Entity Attacks (XXE) https://mohemiv.com/files/XML_Exteral_Entity_Attack.pdf
- XXE (Xml eXternal Entity) Attack https://seclists.org/bugtraq/2002/Oct/420/
- XML External Entities (XXE) Attack http://projects.webappsec.org/w/page/13247003/XML%20External%20Entities
- XML Denial of Service Attacks and Defenses https://learn.microsoft.com/en-us/archive/msdn-magazine/2009/november/xml-denial-of-service-attacks-and-defenses
- Preventing XXE in PHP https://websec.io/2012/08/27/Preventing-XXE-in-PHP.html
Don't Let Security
Weigh You Down.
Stop choosing between AI velocity and security debt. Plexicus is the only platform that runs Vibe Coding Security and ASPM in parallel — one workflow, every codebase.