Overview
The vulnerability referred to as CVE-2025-52888 is a critical XML External Entity (XXE) issue in Allure Report’s xunit-xml-plugin. This vulnerability exposes systems running Allure Report versions prior to 2.34.1 to potential system compromise or data leakage. Considering the wide usage of Allure 2 in multi-language test reporting, this vulnerability could potentially affect a broad range of systems.
Vulnerability Summary
CVE ID: CVE-2025-52888
Severity: High, CVSS 7.5
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: System compromise and potential data leakage
Affected Products
A new way to communicate
Ameeba Chat is built on encrypted identity, not personal profiles.
Message, call, share files, and coordinate with identities kept separate.
- • Encrypted identity
- • Ameeba Chat authenticates access
- • Aliases and categories
- • End-to-end encrypted chat, calls, and files
- • Secure notes for sensitive information
Private communication, rethought.
Product | Affected Versions
Allure Report | Prior to 2.34.1
How the Exploit Works
The exploit takes advantage of a vulnerability in the xunit-xml-plugin used by Allure 2. The XML parser (`DocumentBuilderFactory`) is not securely configured, enabling external entity expansion when processing test result .xml files. Attackers can exploit this to read arbitrary files from the file system and possibly trigger server-side request forgery (SSRF).
Conceptual Example Code
In this conceptual example, an attacker crafts a malicious XML file that references an external entity. The external entity points to a sensitive file on the server. When the vulnerable application processes this file, it inadvertently discloses the content of the sensitive file to the attacker.
<!DOCTYPE foo [
<!ELEMENT foo ANY >
<!ENTITY xxe SYSTEM "file:///etc/passwd" >]><foo>&xxe;</foo>
The attacker sends this XML file to a test endpoint that uses the vulnerable xunit-xml-plugin for processing. The server responds with the contents of the /etc/passwd file, disclosing sensitive information.
