CVE-2025-49794

A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path="..."/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.1 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
redhatCNA
9.1 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
CISA-ADPADP
---
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 48%
Debian logo
Debian Releases
Debian Product
Codename
libxml2
bullseye
vulnerable
bullseye (security)
2.9.10+dfsg-6.7+deb11u9
fixed
bookworm
2.9.14+dfsg-1.3~deb12u4
fixed
bookworm (security)
2.9.14+dfsg-1.3~deb12u4
fixed
trixie (security)
2.12.7+dfsg+really2.9.14-2.1+deb13u1
fixed
trixie
2.12.7+dfsg+really2.9.14-2.1+deb13u1
fixed
forky
2.14.6+dfsg-0.1
fixed
sid
2.15.1+dfsg-0.3
fixed