Skip to content

Fix Apache Tika XXE CVE-2025-66516 #34163

@cursor

Description

@cursor

Summary

  • Customer security teams escalated CVE-2025-66516 (Apache Tika XFA XXE/SSRF) that exposes file read and SSRF vectors in our bundled Tika plugin.
  • dotCMS currently ships Apache Tika 2.8.0 via independent-projects/core-plugins/tika-plugin/pom.xml and 1.28.5 in osgi-base/system-bundles/pom.xml, both of which are vulnerable.
  • We must upgrade every Tika artifact we publish (core plugin, shaded bundles, docker images) to the patched Tika release and communicate availability to customers.

Details

  • CVE: https://nvd.nist.gov/vuln/detail/CVE-2025-66516 (CVSS 10.0)
  • Current plugin property: <tika.version>2.8.0</tika.version>
    • independent-projects/core-plugins/tika-plugin/pom.xml
    • osgi-base/system-bundles/pom.xml still references 1.28.5 when embedding the plugin.
  • Vulnerability allows malicious PDFs with XFA forms to exfiltrate local files and perform SSRF once parsed. Public PoC already exists.

Acceptance Criteria

  • Upgrade all Apache Tika dependencies (core + parsers) to the first fixed version (latest 2.x containing the XXE patch; confirm upstream release notes).
  • Ensure OSGi/system bundle packaging embeds the updated plugin and no longer distributes prior versions.
  • Rebuild/publish patched dotCMS containers or plugins and update dev.dotcms.com/docs/known-security-issues with mitigation guidance.
  • Add regression coverage (unit or integration) around PDF ingestion to ensure no parsing regressions with the new Tika.
  • Communicate availability to Support for responding to ticket 34718.

Metadata

Metadata

Assignees

No one assigned

    Type

    Projects

    Status

    Next 2-4 Sprints

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions