fkie_cve-2025-7425
Vulnerability from fkie_nvd
Published
2025-07-10 14:15
Modified
2025-09-11 18:15
Summary
A flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT functions, such as the key() process, result in tree fragments, this corruption prevents the proper cleanup of ID attributes. As a result, the system may access freed memory, causing crashes or enabling attackers to trigger heap corruption.
References
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2025:12447
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2025:12450
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2025:13267
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2025:13308
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2025:13309
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2025:13310
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2025:13311
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2025:13312
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2025:13313
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2025:13314
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2025:13335
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2025:13464
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2025:13622
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2025:14059
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2025:14396
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2025:14818
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2025:14819
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2025:14853
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2025:14858
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2025:15308
secalert@redhat.comhttps://access.redhat.com/security/cve/CVE-2025-7425
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=2379274
secalert@redhat.comhttps://gitlab.gnome.org/GNOME/libxslt/-/issues/140
134c704f-9b21-4f2e-91b3-4a467353bcc0https://gitlab.gnome.org/GNOME/libxslt/-/issues/140
Impacted products
Vendor Product Version



{
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT functions, such as the key() process, result in tree fragments, this corruption prevents the proper cleanup of ID attributes. As a result, the system may access freed memory, causing crashes or enabling attackers to trigger heap corruption."
    },
    {
      "lang": "es",
      "value": "Se encontr\u00f3 una falla en libxslt donde los atributos type, atype y flags se modifican de forma que corrompe la gesti\u00f3n de memoria interna. Cuando las funciones XSLT, como el proceso key(), generan fragmentos de \u00e1rbol, esta corrupci\u00f3n impide la limpieza correcta de los atributos ID. Como resultado, el sistema puede acceder a la memoria liberada, provocando fallos o permitiendo a los atacantes provocar la corrupci\u00f3n del mont\u00f3n."
    }
  ],
  "id": "CVE-2025-7425",
  "lastModified": "2025-09-11T18:15:36.023",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.4,
        "impactScore": 5.8,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-07-10T14:15:27.877",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2025:12447"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2025:12450"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2025:13267"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2025:13308"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2025:13309"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2025:13310"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2025:13311"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2025:13312"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2025:13313"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2025:13314"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2025:13335"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2025:13464"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2025:13622"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2025:14059"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2025:14396"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2025:14818"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2025:14819"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2025:14853"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2025:14858"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2025:15308"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/security/cve/CVE-2025-7425"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2379274"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://gitlab.gnome.org/GNOME/libxslt/-/issues/140"
    },
    {
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "url": "https://gitlab.gnome.org/GNOME/libxslt/-/issues/140"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Undergoing Analysis",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…