CVE-2025-7425

EUVD-2025-20998
A flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT functions, such as the key() process, result in tree fragments, this corruption prevents the proper cleanup of ID attributes. As a result, the system may access freed memory, causing crashes or enabling attackers to trigger heap corruption.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.8 HIGH
LOCAL
HIGH
NONE
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H
redhatCNA
7.8 HIGH
LOCAL
HIGH
NONE
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 9%
Debian logo
Debian Releases
Debian Product
Codename
libxslt
bookworm
1.1.35-1+deb12u3
not-affected
bookworm (security)
1.1.35-1+deb12u3
fixed
bullseye
1.1.34-4+deb11u1
not-affected
bullseye (security)
1.1.34-4+deb11u3
fixed
forky
vulnerable
sid
vulnerable
trixie
1.1.35-1.2+deb13u2
not-affected
trixie (security)
1.1.35-1.2+deb13u2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libxslt
bionic
not-affected
focal
not-affected
jammy
not-affected
noble
deferred
oracular
ignored
plucky
ignored
questing
deferred
trusty
not-affected
xenial
not-affected
libxml2
bionic
Fixed 2.9.4+dfsg1-6.1ubuntu1.9+esm6
released
focal
Fixed 2.9.10+dfsg-5ubuntu0.20.04.10+esm3
released
jammy
Fixed 2.9.13+dfsg-1ubuntu0.10
released
noble
Fixed 2.9.14+dfsg-1.3ubuntu3.6
released
plucky
Fixed 2.12.7+dfsg+really2.9.14-0.4ubuntu0.4
released
questing
not-affected
trusty
Fixed 2.9.1+dfsg1-3ubuntu4.13+esm10
released
xenial
Fixed 2.9.3+dfsg1-1ubuntu0.7+esm11
released
References