XEE-induced DoS in Ivanti Connect Secure pre-22.7R2.8 & related products
CVE-2025-5466 Published on August 12, 2025

XEE in Ivanti Connect Secure before 22.7R2.8 or 22.8R2, Ivanti Policy Secure before 22.7R1.5, Ivanti ZTA Gateway before 22.8R2.3-723 and Ivanti Neurons for Secure Access before 22.8R1.4 (Fix deployed on 02-Aug-2025) allows a remote authenticated attacker with admin privileges to trigger a denial of service

NVD

Vulnerability Analysis

CVE-2025-5466 is exploitable with network access, and requires user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a high impact on availability.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
HIGH
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
NONE
Integrity Impact:
NONE
Availability Impact:
HIGH

Weakness Type

What is a XEE Vulnerability?

The software uses XML documents and allows their structure to be defined with a Document Type Definition (DTD), but it does not properly control the number of recursive definitions of entities. If the DTD contains a large number of nested or recursive entities, this can lead to explosive growth of data when parsed, causing a denial of service.

CVE-2025-5466 has been classified to as a XEE vulnerability or weakness.


Products Associated with CVE-2025-5466

Want to know whenever a new CVE is published for Ivanti Connect Secure? stack.watch will email you.

 

Affected Versions

Ivanti Connect Secure: Ivanti Policy Secure: Ivanti ZTA Gateway: Ivanti Neurons for Secure Access:

Exploit Probability

EPSS
0.98%
Percentile
76.50%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.