Metrics
Affected Vendors & Products
Tue, 17 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:zoneland:o2oa:*:*:*:*:*:*:*:* |
Tue, 10 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Feb 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zoneland
Zoneland o2oa |
|
| Vendors & Products |
Zoneland
Zoneland o2oa |
Sat, 07 Feb 2026 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in O2OA up to 9.0.0. This impacts an unknown function of the file /x_program_center/jaxrs/mpweixin/check of the component HTTP POST Request Handler. The manipulation leads to xml external entity reference. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | O2OA HTTP POST Request check xml external entity reference | |
| Weaknesses | CWE-610 CWE-611 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-23T09:29:26.009Z
Reserved: 2026-02-06T07:46:08.815Z
Link: CVE-2026-2074
Updated: 2026-02-10T15:24:41.275Z
Status : Analyzed
Published: 2026-02-07T05:16:12.800
Modified: 2026-02-17T19:07:40.393
Link: CVE-2026-2074
No data.