CVE-2025-49794
Published: June 12, 2025Last modified: July 22, 2025
Description
A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path="..."/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.1 |
Attack Vector | NETWORK |
Attack complexity | LOW |
Privileges required | NONE |
User interaction | NONE |
Scope | UNCHANGED |
Confidentiality | NONE |
Integrity impact | HIGH |
Availability impact | HIGH |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | libxml2 | Unknown (2.10.3-r2) |
Stream | libxml2 | Unknown (2.10.3-r2) | |
Hardened Containers | 23 LTS | libxml2 | Unknown (2.10.3-r2) |
Stream | libxml2 | Unknown (2.10.3-r2) |