The component accepts XML input through the publisher without disabling external entity resolution. This allows malicious actors to submit a crafted XML payload that exploits the unescaped external entity references. By leveraging this vulnerability, a malicious actor can read confidential files from the product's file system or access limited HTTP resources reachable via HTTP GET requests to the vulnerable product.
Use CWE-611, Wso2 vendor hub and Api Manager product page to widen CVE-2024-8010 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2025-9312, CVE-2025-13590 and CVE-2025-6670 for nearby disclosures in the same product family.