CWE-611 Base Draft

Improper Restriction of XML External Entity Reference

This vulnerability occurs when an application processes XML input without properly restricting external entity references. Attackers can exploit this to read local files, trigger internal network…

Definition

What is CWE-611?

This vulnerability occurs when an application processes XML input without properly restricting external entity references. Attackers can exploit this to read local files, trigger internal network requests, or cause denial of service.
XML parsers often support Document Type Definitions (DTDs), which can define custom entities. When these entities point to external URIs (like file://, http://), the parser may fetch and include that external content. An attacker can inject a malicious DTD that references sensitive system files (e.g., /etc/passwd, C:\Windows\win.ini) or internal endpoints, leading to data exposure or server-side request forgery (SSRF). The retrieved data is often reflected in the application's output, such as error messages or API responses. Preventing XXE requires disabling DTD processing entirely or securely configuring the XML parser to reject external entities. Since manual code reviews and traditional SAST tools can miss parser configurations, managing this at scale is difficult; an ASPM like Plexicus can help you track and remediate these flaws across your entire stack by correlating findings with actual runtime behavior and suggesting prioritized fixes.
Real-world impact

Real-world CVEs caused by CWE-611

  • Recruiter software allows reading arbitrary files using XXE

  • A browser control can allow remote attackers to determine the existence of files via Javascript containing XML script.

  • XXE during SVG image conversion

  • XXE in PHP application allows reading the application's configuration file.

  • XXE in database server

  • XXE in rapid web application development framework allows reading arbitrary files.

  • XXE via XML-RPC request.

  • XXE in office document product using RDF.

How attackers exploit it

Step-by-step attacker path

  1. 1

    Identify a code path that handles untrusted input without validation.

  2. 2

    Craft a payload that exercises the unsafe behavior — injection, traversal, overflow, or logic abuse.

  3. 3

    Deliver the payload through a normal request and observe the application's reaction.

  4. 4

    Iterate until the response leaks data, executes attacker code, or escalates privileges.

Vulnerable code example

Vulnerable pseudo

MITRE has not published a code example for this CWE. The pattern below is illustrative — see Resources for canonical references.

Vulnerable pseudo
// Example pattern — see MITRE for the canonical references.
function handleRequest(input) {
  // Untrusted input flows directly into the sensitive sink.
  return executeUnsafe(input);
}
Secure code example

Secure pseudo

Secure pseudo
// Validate, sanitize, or use a safe API before reaching the sink.
function handleRequest(input) {
  const safe = validateAndEscape(input);
  return executeWithGuards(safe);
}
What changed: the unsafe sink is replaced (or the input is validated/escaped) so the same payload no longer triggers the weakness.
Prevention checklist

How to prevent CWE-611

  • Implementation / System Configuration Many XML parsers and validators can be configured to disable external entity expansion.
Detection signals

How to detect CWE-611

Automated Static Analysis High

Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)

Plexicus auto-fix

Plexicus auto-detects CWE-611 and opens a fix PR in under 60 seconds.

Codex Remedium scans every commit, identifies this exact weakness, and ships a reviewer-ready pull request with the patch. No tickets. No hand-offs.

Frequently asked questions

Frequently asked questions

What is CWE-611?

This vulnerability occurs when an application processes XML input without properly restricting external entity references. Attackers can exploit this to read local files, trigger internal network requests, or cause denial of service.

How serious is CWE-611?

MITRE has not published a likelihood-of-exploit rating for this weakness. Treat it as medium-impact until your threat model proves otherwise.

What languages or platforms are affected by CWE-611?

MITRE lists the following affected platforms: XML, Web Based.

How can I prevent CWE-611?

Many XML parsers and validators can be configured to disable external entity expansion.

How does Plexicus detect and fix CWE-611?

Plexicus's SAST engine matches the data-flow signature for CWE-611 on every commit. When a match is found, our Codex Remedium agent opens a fix PR with the corrected code, tests, and a one-line summary for the reviewer.

Where can I learn more about CWE-611?

MITRE publishes the canonical definition at https://cwe.mitre.org/data/definitions/611.html. You can also reference OWASP and NIST documentation for adjacent guidance.

Related weaknesses

Weaknesses related to CWE-611

CWE-610 Parent

Externally Controlled Reference to a Resource in Another Sphere

This vulnerability occurs when an application uses user-supplied input to reference a resource located outside its intended security…

CWE-1021 Sibling

Improper Restriction of Rendered UI Layers or Frames

This vulnerability occurs when a web application fails to properly control whether its pages can be embedded within frames or UI layers…

CWE-15 Sibling

External Control of System or Configuration Setting

This vulnerability occurs when an application allows users to directly modify critical system settings or configuration values from an…

CWE-384 Sibling

Session Fixation

Session fixation occurs when an application authenticates a user without first destroying the previous session ID. This allows an attacker…

CWE-441 Sibling

Unintended Proxy or Intermediary ('Confused Deputy')

A confused deputy vulnerability occurs when a system receives a request from a client and forwards it to an external destination without…

CWE-470 Sibling

Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

This vulnerability occurs when an application uses unvalidated external input, like a URL parameter or form field, to dynamically decide…

CWE-601 Sibling

URL Redirection to Untrusted Site ('Open Redirect')

An open redirect vulnerability occurs when a web application uses unvalidated user input to determine the destination of a redirect,…

CWE-73 Sibling

External Control of File Name or Path

This vulnerability occurs when an application uses unvalidated user input to construct file or directory paths for filesystem operations.

CWE-918 Sibling

Server-Side Request Forgery (SSRF)

Server-Side Request Forgery (SSRF) occurs when a web application fetches a remote resource based on user-controlled input, but fails to…

Ready when you are

Don't Let Security
Weigh You Down.

Stop choosing between AI velocity and security debt. Plexicus is the only platform that runs Vibe Coding Security and ASPM in parallel — one workflow, every codebase.