MITRE service request: 1988723
Status: RESERVED (pending a qualifying public reference per CNA Rules §5.3).
Docling’s JATS XML backend is vulnerable to XML Entity Expansion (XXE) attacks thru 2.61.0. The backend uses etree.parse() to parse XML files without disabling entity resolution. An attacker can craft a malicious XML file containing a nested entity expansion payload (XML Bomb). When processed by Docling, the exponential expansion of entities leads to excessive resource consumption, resulting in a denial of service (DoS) condition on the system running the Docling parser.
python -m docling.cli.main exploit.xml --from xml_jats triggers lxml.etree.parse with default entity expansion, so a small XML file can exhaust CPU/RAM via billion-laughs style entities.
JatsDocumentBackend.__init__ calling etree.parse on attacker XML.resolve_entities=False / defusedxml equivalents; cap input size.Medium–High availability impact on ingestion services.