### [CVE-2020-26710](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26710) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description easy-parse v0.1.1 was discovered to contain a XML External Entity Injection (XXE) vulnerability which allows attackers to execute arbitrary code via a crafted XML file. ### POC #### Reference - https://github.com/uncmath25/easy-parse/issues/3 - https://github.com/uncmath25/easy-parse/issues/3 #### Github No PoCs found on GitHub currently.