Skip to content

Commit f7a5b16

Browse files
jasnowRubySec CI
authored andcommitted
Updated advisory posts against rubysec/ruby-advisory-db@dff94e0
1 parent 2326dda commit f7a5b16

File tree

1 file changed

+46
-0
lines changed

1 file changed

+46
-0
lines changed
Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2025-58767 (rexml): REXML has DoS condition when parsing malformed XML
4+
file'
5+
comments: false
6+
categories:
7+
- rexml
8+
advisory:
9+
gem: rexml
10+
cve: 2025-58767
11+
ghsa: c2f4-jgmc-q2r5
12+
url: https://github.com/ruby/rexml/security/advisories/GHSA-c2f4-jgmc-q2r5
13+
title: REXML has DoS condition when parsing malformed XML file
14+
date: 2025-09-17
15+
description: |
16+
### Impact
17+
18+
The REXML gems from 3.3.3 to 3.4.1 have a DoS vulnerability when
19+
parsing XML containing multiple XML declarations. If you need to
20+
parse untrusted XMLs, you may be impacted to these vulnerabilities.
21+
22+
### Patches
23+
24+
REXML gems 3.4.2 or later include the patches to fix these vulnerabilities.
25+
26+
### Workarounds
27+
28+
Don't parse untrusted XMLs.
29+
30+
### References
31+
32+
* https://www.ruby-lang.org/en/news/2025/09/18/dos-rexml-cve-2025-58767
33+
- An announcement on www.ruby-lang.org
34+
cvss_v4: 1.2
35+
unaffected_versions:
36+
- "< 3.3.3"
37+
patched_versions:
38+
- ">= 3.4.2"
39+
related:
40+
url:
41+
- https://nvd.nist.gov/vuln/detail/CVE-2025-58767
42+
- https://www.ruby-lang.org/en/news/2025/09/18/dos-rexml-cve-2025-58767
43+
- https://github.com/ruby/rexml/security/advisories/GHSA-c2f4-jgmc-q2r5
44+
- https://github.com/ruby/rexml/commit/5859bdeac792687eaf93d8e8f0b7e3c1e2ed5c23
45+
- https://github.com/advisories/GHSA-c2f4-jgmc-q2r5
46+
---

0 commit comments

Comments
 (0)