SYM_PY_0169 - SymbioticSec/Symbiotic-Vulnerability-Database GitHub Wiki

XML Injection

Property Value
Language python
Severity high
CWE CWE-91: XML Injection
OWASP A03:2021 - Injection
Confidence Level Medium
Impact Level Medium
Likelihood Level High

Description

Building TwiML (Twilio Markup Language) responses using user input or variable data without proper escaping can let attackers inject malicious XML commands. This happens when dynamic strings are used directly to create TwiML responses.

Impact

If exploited, attackers could manipulate the TwiML sent to Twilio, potentially making unauthorized calls, sending messages, or altering call behavior. This can lead to abuse of your Twilio account, data leakage, or disruption of communication services.