xslt-injection
Warn
Audited by Gen Agent Trust Hub on Apr 22, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides XML snippets that execute system commands, such as
rt:execfor Java andProcess.Startfor .NET, allowing for terminal command execution on the target server.\n- [REMOTE_CODE_EXECUTION]: The documentation includes instructions for gaining remote code execution by exploiting XSLT processor features like PHP'sphp:functionwith theassertcall or Java's extension functions to run arbitrary code.\n- [DATA_EXFILTRATION]: The methodology outlines how to use XSLT functions likedocument()to read sensitive files from the local filesystem (e.g.,/etc/passwd) or perform server-side request forgery (SSRF) to interact with internal network resources.
Audit Metadata