FixVibe

// código / spotlight

veraPDF XSLT Injection Dependency Advisory

Affected veraPDF policy-file processing can put XSLT execution boundaries at risk.

El gancho

veraPDF is often used in document validation pipelines where policy files and Schematron profiles can become part of the processing surface. CVE-2024-28109 is tied to affected veraPDF packages before their fixed release lines; FixVibe treats a repo match as dependency evidence, not proof that custom policy files are attacker-controlled in production.

Com funciona

The repo check looks for affected `org.verapdf` Maven coordinates in Java build files. Exact declared versions produce the strongest signal, including versions referenced through local Maven properties. The finding stays scoped to dependency evidence and does not claim FixVibe ran veraPDF, processed policy files, or executed XSLT.

El radio de impacto

If an affected veraPDF runtime processes untrusted custom policy files under the advisory conditions, XSLT behavior may cross into sensitive file or code-execution boundaries. A repo match should trigger dependency-tree review, runtime input review, artifact rebuild, and deployment verification before anyone treats it as confirmed exploitability.

// what fixvibe checks

What FixVibe checks

FixVibe repo scans look for high-confidence security patterns and dependency risk in source context. Reports identify the affected area and recommended fix. For check-specific questions about exact detection heuristics, active payload details, or source-code rule patterns, contact support@fixvibe.app.

Defensas a prueba de balas

Upgrade affected veraPDF artifacts to the package-specific fixed version, regenerate Maven or Gradle metadata, and rebuild the deployed artifact or image. If the app accepts custom veraPDF policy files or validation profiles, allow only trusted sources and verify secure XSLT processing settings remain enabled after the upgrade.

// ejecútalo en tu propia app

Sigue lanzando mientras FixVibe vigila.

FixVibe somete la superficie pública de tu app a la misma presión que un atacante — sin agente, sin instalación, sin tarjeta. Seguimos investigando nuevos patrones de vulnerabilidad y los convertimos en checks prácticos y fixes listos para Cursor, Claude y Copilot.

Código fuente
58
tests en esta categoría
módulos
20
checks dedicados de código fuente
cada scan
397+
tests en todas las categorías
  • Gratis — sin tarjeta, sin instalación, sin ping de Slack
  • Solo pega una URL — nosotros crawleamos, sondeamos y reportamos
  • Hallazgos clasificados por severidad, deduplicados al puro signal
  • Prompts de fix actuales, listos para Cursor, Claude, Copilot
Ejecutar un escaneo gratis

// checks actuales · fixes prácticos · lanza con confianza

veraPDF XSLT Injection Dependency Advisory — Spotlight de Vulnerabilidad | FixVibe · FixVibe