MASWE-0087: Insecure Parsing and Escaping
Content in BETA
This content is in beta and still under active development, so it is subject to change any time (e.g. structure, IDs, content, URLs, etc.).
Placeholder Weakness
This weakness hasn't been created yet and it's a placeholder. But you can check its status or start working on it yourself. If the issue has not yet been assigned, you can request to be assigned to it and submit a PR with the new content for that weakness by following our guidelines.
Check our GitHub Issues for MASWE-0087
Initial Description or Hints¶
e.g. XML External Entity (XXE) attacks, X509 certificate parsing, character escaping.
Relevant Topics¶
- The app does not properly escape or encode special characters when handling structured output formats (e.g., HTML, XML, JSON), which may lead to injection or rendering issues in downstream components (CWE-116).
- The app parses XML input without restricting external entity resolution, allowing XML External Entity (XXE) attacks that can expose files, initiate SSRF, or disrupt app logic (CWE-611).
MASTG v1 Coverage¶
No MASTG v1 tests are related to this weakness.