XEE-induced DoS in Ivanti Connect Secure pre-22.7R2.8 & related products
CVE-2025-5466 Published on August 12, 2025
XEE in Ivanti Connect Secure before 22.7R2.8 or 22.8R2, Ivanti Policy Secure before 22.7R1.5, Ivanti ZTA Gateway before 22.8R2.3-723 and Ivanti Neurons for Secure Access before 22.8R1.4 (Fix deployed on 02-Aug-2025) allows a remote authenticated attacker with admin privileges to trigger a denial of service
Vulnerability Analysis
CVE-2025-5466 is exploitable with network access, and requires user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a high impact on availability.
Weakness Type
What is a XEE Vulnerability?
The software uses XML documents and allows their structure to be defined with a Document Type Definition (DTD), but it does not properly control the number of recursive definitions of entities. If the DTD contains a large number of nested or recursive entities, this can lead to explosive growth of data when parsed, causing a denial of service.
CVE-2025-5466 has been classified to as a XEE vulnerability or weakness.
Products Associated with CVE-2025-5466
Want to know whenever a new CVE is published for Ivanti Connect Secure? stack.watch will email you.
Affected Versions
Ivanti Connect Secure:- Version 22.7R2.8 is unaffected.
- Version 22.8R2 is unaffected.
- Version 22.7R1.5 is unaffected.
- Version 22.8R2.3-723 is unaffected.
- Version 22.8R1.4 (Fix deployed on 02-Aug-2025) is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.