CVE-2025-7425

A flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT functions, such as the key() process, result in tree fragments, this corruption prevents the proper cleanup of ID attributes. As a result, the system may access freed memory, causing crashes or enabling attackers to trigger heap corruption.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.8 HIGH
LOCAL
HIGH
NONE
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H
redhatCNA
7.8 HIGH
LOCAL
HIGH
NONE
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H
CISA-ADPADP
---
---
CVEADP
---
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 11%
Debian logo
Debian Releases
Debian Product
Codename
libxslt
bullseye
vulnerable
trixie
no-dsa
bookworm
no-dsa
bullseye (security)
vulnerable
bookworm (security)
vulnerable
trixie (security)
vulnerable
forky
vulnerable
sid
vulnerable
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libxslt
questing
deferred
plucky
deferred
oracular
ignored
noble
deferred
jammy
deferred
focal
deferred
bionic
deferred
xenial
deferred
trusty
deferred
libxml2
questing
not-affected
plucky
Fixed 2.12.7+dfsg+really2.9.14-0.4ubuntu0.4
released
noble
Fixed 2.9.14+dfsg-1.3ubuntu3.6
released
jammy
Fixed 2.9.13+dfsg-1ubuntu0.10
released
focal
Fixed 2.9.10+dfsg-5ubuntu0.20.04.10+esm3
released
bionic
Fixed 2.9.4+dfsg1-6.1ubuntu1.9+esm6
released
xenial
Fixed 2.9.3+dfsg1-1ubuntu0.7+esm11
released
trusty
Fixed 2.9.1+dfsg1-3ubuntu4.13+esm10
released
References