All,

Two DSpace security advisories have been released that impact *all DSpace 
versions*.

*CVE-2025-53621 
<https://github.com/DSpace/DSpace/security/advisories/GHSA-jjwr-5cfh-7xwh>* : 
XML External Entity (XXE) injection possible in import via Simple Archive 
Format (SAF) or import from external sources.

   - *Severity: Moderate* (6.9 out of 10.0 using CVSSv3)
   - *Affected Versions:* <= 7.6.3, 8.0 <= 8.1, 9.0  (includes unsupported 
   releases 1.x - 6.x)
   - *Patched Versions:* *7.6.4, 8.2, 9.1*
   - Reported by: Pablo Picurelli Ortiz (@superpegaso2703)
   - Patches for 7.x, 8.x and 9.x are available in the *security advisory 
   <https://github.com/DSpace/DSpace/security/advisories/GHSA-jjwr-5cfh-7xwh>* 
for 
   sites that cannot upgrade immediately.
   

To exploit this XXE vulnerability, the attacker must have administrator 
privileges or convince an existing administrator to import a malicious SAF 
archive into DSpace. 

Importing via external source (from MyDSpace or Submission form) is also 
vulnerable to XXE for four external sources: *ArXiv, CrossRef, OpenAIRE and 
Creative Commons*. However, *the likelihood of this attack is very low* because 
it would require the external source’s API to be compromised such that it 
sends DSpace a malicious payload in response. Nonetheless, if you distrust 
any of these services, you should consider *disabling that external source 
<https://wiki.lyrasis.org/pages/viewpage.action?pageId=104566672>* until 
you are able to patch or upgrade your site.

*CVE-2025-53622 
<https://github.com/DSpace/DSpace/security/advisories/GHSA-vhvx-8xgc-99wf>*
 : Path traversal vulnerability in Simple Archive Format (SAF) package 
import via “contents” file.

   - *Severity: Moderate* (5.2 out of 10.0 using CVSSv3)
   - *Affected Versions:* <= 7.6.3, 8.0 <= 8.1, 9.0  (includes unsupported 
   releases 1.x - 6.x)
   - *Patched Versions: 7.6.4, 8.2, 9.1*
   - Reported by: Marcin Miłosz (@MMilosz) of PCG Academia
   - Patches for 7.x, 8.x and 9.x are available in the *security advisory 
   <https://github.com/DSpace/DSpace/security/advisories/GHSA-vhvx-8xgc-99wf>* 
for 
   sites that cannot upgrade immediately.
   

Similar to the above vulnerability, the attacker must have administrator 
privileges or convince an existing administrator to import a malicious SAF 
archive into DSpace. The key difference is that this attack occurs via a 
malicious “contents” file within the SAF archive.

We recommend that all DSpace sites immediately apply patches or upgrade.  
While both of these vulnerabilities require administrative privileges, 
these attacks may be difficult for an administrator to manually detect in 
larger Simple Archive Format (SAF) packages.

*Until you upgrade or patch your site,* *we highly recommend avoiding 
importing any untrusted **Simple Archive Format (SAF) packages 
<https://wiki.lyrasis.org/pages/viewpage.action?pageId=104566653>*. These 
SAF packages are imported via either the “./dspace import” command line 
tool, or the “Import -> Batch Import (ZIP)” tool in the Admin User 
Interface. Both methods of importing these packages are vulnerable to these 
attacks.

If you have any questions about these security advisories, *please email 
[email protected]*. This email address sends a private email to all 
DSpace Committers.

Sincerely,

Tim Donohue, on behalf of the DSpace Committers

-- 
All messages to this mailing list should adhere to the Code of Conduct: 
https://www.lyrasis.org/about/Pages/Code-of-Conduct.aspx
--- 
You received this message because you are subscribed to the Google Groups 
"DSpace Technical Support" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion visit 
https://groups.google.com/d/msgid/dspace-tech/ab2cd70a-4670-4218-9bcc-7c574ddc95ben%40googlegroups.com.

Reply via email to