A vulnerability was detected in beecue FastBee up to 2.1....
Moderate severity
Unreviewed
Published
Dec 30, 2025
to the GitHub Advisory Database
•
Updated Dec 30, 2025
Description
Published by the National Vulnerability Database
Dec 30, 2025
Published to the GitHub Advisory Database
Dec 30, 2025
Last updated
Dec 30, 2025
A vulnerability was detected in beecue FastBee up to 2.1. Impacted is the function getRootElement of the file springboot/fastbee-server/sip-server/src/main/java/com/fastbee/sip/handler/req/ReqAbstractHandler.java of the component SIP Message Handler. The manipulation results in xml external entity reference. It is possible to launch the attack remotely. A high complexity level is associated with this attack. The exploitability is considered difficult. The project owner replied to the issue report: "Okay, we'll handle it as soon as possible."
References