Intel

AIKIDO-2026-10107

plexus-xml is vulnerable to Regular Expression Denial of Service (ReDoS)

Regular Expression Denial of Service (ReDoS) Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.

28

Low Risk

This Affects:

JAVAplexus-xml
3.0.0 - 4.1.0
Fixed in 4.1.1

TL;DR

Affected versions of this package use a polynomial-time regular expression in the XML encoding detection logic (ENCODING_PATTERN) that is susceptible to catastrophic backtracking on crafted XML input, leading to excessive CPU usage (a regular expression denial of service). The patched version changes the pattern to use non-greedy matching.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

plexus-xml is vulnerable to Regular Expression Denial of Service (ReDoS) in versions 3.0.0 - 4.1.0.

How to fix this

Upgrade the org.codehaus.plexus:plexus-xml library to the patch version.

Background Info