CVE-2025-24928 – Libxml2 Stack-Based Buffer Overflow Vulnerability

The following table lists the changes that have been made to the
CVE-2025-24928 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Feb. 18, 2025

    Action Type Old Value New Value
    Added Description libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.
    Added CVSS V3.1 AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
    Added CWE CWE-121
    Added Reference https://gitlab.gnome.org/GNOME/libxml2/-/issues/847
    Added Reference https://issues.oss-fuzz.com/issues/392687022
Share the Post:

Related Posts