Skip to content

Commit dff94e0

Browse files
jasnowpostmodern
authored andcommitted
GHSA SYNC: 1 brand new advisory
1 parent 84c99b9 commit dff94e0

File tree

1 file changed

+38
-0
lines changed

1 file changed

+38
-0
lines changed

gems/rexml/CVE-2025-58767.yml

Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
---
2+
gem: rexml
3+
cve: 2025-58767
4+
ghsa: c2f4-jgmc-q2r5
5+
url: https://github.com/ruby/rexml/security/advisories/GHSA-c2f4-jgmc-q2r5
6+
title: REXML has DoS condition when parsing malformed XML file
7+
date: 2025-09-17
8+
description: |
9+
### Impact
10+
11+
The REXML gems from 3.3.3 to 3.4.1 have a DoS vulnerability when
12+
parsing XML containing multiple XML declarations. If you need to
13+
parse untrusted XMLs, you may be impacted to these vulnerabilities.
14+
15+
### Patches
16+
17+
REXML gems 3.4.2 or later include the patches to fix these vulnerabilities.
18+
19+
### Workarounds
20+
21+
Don't parse untrusted XMLs.
22+
23+
### References
24+
25+
* https://www.ruby-lang.org/en/news/2025/09/18/dos-rexml-cve-2025-58767
26+
- An announcement on www.ruby-lang.org
27+
cvss_v4: 1.2
28+
unaffected_versions:
29+
- "< 3.3.3"
30+
patched_versions:
31+
- ">= 3.4.2"
32+
related:
33+
url:
34+
- https://nvd.nist.gov/vuln/detail/CVE-2025-58767
35+
- https://www.ruby-lang.org/en/news/2025/09/18/dos-rexml-cve-2025-58767
36+
- https://github.com/ruby/rexml/security/advisories/GHSA-c2f4-jgmc-q2r5
37+
- https://github.com/ruby/rexml/commit/5859bdeac792687eaf93d8e8f0b7e3c1e2ed5c23
38+
- https://github.com/advisories/GHSA-c2f4-jgmc-q2r5

0 commit comments

Comments
 (0)