← Advisories

Pachno 1.0.6 Wiki TextParser XXE Vulnerability

High
Advisory ID
ZSL-2026-5984
Release Date
12 April 2026
Vendor
Daniel André Eikeland - https://github.com/pachno/pachno
Affected Version
1.0.6
CVE
N/A
Tested On
GNU/Linux, Apache2, PHP/7.4, MySQL/5.7 (MariaDB)
Summary

Pachno is an open-source collaboration platform (formerly known as The Bug Genie) designed for team project management, issue tracking, and documentation. It offers a module-based, customizable environment for software development and team workflows, distributed under the Mozilla Public License.

Description

Input passed via wiki table syntax ({|..., |-..., |...||...) and allowed inline tags (<span>, <div>, <blockquote>, etc.) in issue descriptions, comments, and wiki articles is concatenated into XML strings and parsed by simplexml_load_string() in the TextParser helper without setting LIBXML_NONET or otherwise restricting entity resolution. On PHP installations linked against libxml2 < 2.9.0 (where external entity loading is enabled by default), this can be exploited to read arbitrary local files via the file:// scheme, perform server-side request forgery against internal services via the http:// scheme, and exfiltrate the response body through reflected XML attribute values. Successful exploitation requires an authenticated session with permission to create or edit content that is rendered through the wiki parser. On PHP 7.4+ installations with libxml2 >= 2.9.0 the vulnerability is mitigated by the underlying library but the unsafe code pattern remains.

Proof of Concept
Disclosure Timeline
06.04.2026Vulnerability discovered.
09.04.2026Vendor contacted.
11.04.2026No response from the vendor.
12.04.2026Public security advisory released.
Credits
Vulnerability discovered by Gjoko Krstic
References
N/A
Changelog
12.04.2026Initial release