XXE Injection
Identification
Test for XXE
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE test [
<!ENTITY xxe "XXE_TEST">
]>
<root>
<data>&xxe;</data>
</root>Basic XXE - Read Local Files
/etc/passwd
Windows Files
Common Files to Read
PHP Filter - Read Source Code
XXE to SSRF
Port Scan
Internal Services
Cloud Metadata
XXE to RCE (PHP expect://)
Download Web Shell
Advanced XXE - CDATA Exfiltration
Host xxe.dtd on your server
Payload
Blind XXE - Error-Based
Host error.dtd
Payload
Blind XXE - Out-of-Band (OOB)
Host oob.dtd
Payload
Receive & Decode
PHP Auto-Decode Script
XXE in File Uploads
SVG XXE
XLSX/DOCX XXE
XXE DoS (Billion Laughs)
XXEinjector (Automated Tool)
Bypass WAF
UTF-7 Encoding
Parameter Entities Only
URL Encoding
Quick Reference Payloads
Target
Payload
Last updated