Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2026-24400
January 26, 2026
AssertJ provides Fluent testing assertions for Java and the Java Virtual Machine (JVM). Starting in version 1.4.0 and prior to version 3.27.7, an XML External Entity (XXE) vulnerability exists in "org.assertj.core.util.xml.XmlStringPrettyFormatter": the "toXmlDocument(String)" method initializes "DocumentBuilderFactory" with default settings, without disabling DTDs or external entities. This formatter is used by the "isXmlEqualTo(CharSequence)" assertion for "CharSequence" values. An application is vulnerable only when it uses untrusted XML input with either "isXmlEqualTo(CharSequence)" from "org.assertj.core.api.AbstractCharSequenceAssert" or "xmlPrettyFormat(String)" from "org.assertj.core.util.xml.XmlStringPrettyFormatter". If untrusted XML input is processed by tone of these methods, an attacker couldnread arbitrary local files via "file://" URIs (e.g., "/etc/passwd", application configuration files); perform Server-Side Request Forgery (SSRF) via HTTP/HTTPS URIs, and/or cause Denial of Service via "Billion Laughs" entity expansion attacks. "isXmlEqualTo(CharSequence)" has been deprecated in favor of XMLUnit in version 3.18.0 and will be removed in version 4.0. Users of affected versions should, in order of preference: replace "isXmlEqualTo(CharSequence)" with XMLUnit, upgrade to version 3.27.7, or avoid using "isXmlEqualTo(CharSequence)" or "XmlStringPrettyFormatter" with untrusted input. "XmlStringPrettyFormatter" has historically been considered a utility for "isXmlEqualTo(CharSequence)" rather than a feature for AssertJ users, so it is deprecated in version 3.27.7 and removed in version 4.0, with no replacement.
Affected Packages
https://github.com/assertj/assertj.git (GITHUB):
Affected version(s) >=assertj-build-3.24.0 <assertj-build-3.27.7
Fix Suggestion:
Update to version assertj-build-3.27.7
org.assertj:assertj-core (JAVA):
Affected version(s) >=3.0.0 <3.27.7
Fix Suggestion:
Update to version 3.27.7
org.assertj:assertj-core (JAVA):
Affected version(s) >=1.4.0 <3.27.7
Fix Suggestion:
Update to version 3.27.7
Do you need more information?
Contact Us
CVSS v4
Base Score:
8.2
Attack Vector
LOCAL
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
LOW
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
NONE
Vulnerable System Availability
LOW
Subsequent System Confidentiality
HIGH
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
7.3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
LOW
Weakness Type (CWE)
Improper Restriction of XML External Entity Reference
EPSS
Base Score:
0.01