### [CVE-2024-40896](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40896) ![](https://img.shields.io/static/v1?label=Product&message=libxml2&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=2.11.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=2.12.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=2.13.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference&color=brightgreen) ### Description In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting "checked"). This makes classic XXE attacks possible. ### POC #### Reference - https://gitlab.gnome.org/GNOME/libxml2/-/issues/761 #### Github No PoCs found on GitHub currently.