{"id":"CVE-2016-5851","details":"python-docx before 0.8.6 allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted document.","aliases":["GHSA-34wj-p5jm-2p96","PYSEC-2016-21"],"modified":"2026-04-01T23:53:24.230422Z","published":"2016-12-21T22:59:00.170Z","references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FFMOH7ZPOPQWNJGUZOS5LXX4MGNRXXT/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XU2WSYRNB7CLBBFCGSX34XHACTA2SWDZ/"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/06/28/8"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/91485"},{"type":"FIX","url":"https://github.com/python-openxml/python-docx/blob/v0.8.6/HISTORY.rst"},{"type":"FIX","url":"https://github.com/python-openxml/python-docx/commit/61b40b161b64173ab8e362aec1fd197948431beb"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2016/06/28/7"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/python-openxml/python-docx","events":[{"introduced":"0"},{"last_affected":"bc34ec95a9e7bdff01f5b43b1070bbc0c018ab25"},{"fixed":"61b40b161b64173ab8e362aec1fd197948431beb"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.8.5"}]}}],"versions":["v0.4.0","v0.5.0","v0.5.2","v0.5.3","v0.6.0","v0.7.0","v0.7.1","v0.7.2","v0.7.3","v0.7.4","v0.7.5","v0.7.6","v0.8.0","v0.8.1","v0.8.2","v0.8.3","v0.8.4","v0.8.5"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-5851.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}