CVE-2025-10990: Inefficient Regular Expression Complexity
A flaw was found in REXML. A remote attacker could exploit inefficient regular expression (regex) parsing when processing hex numeric character references (&#x...;) in XML documents. This could lead to a Regular Expression Denial of Service (ReDoS), impacting the availability of the affected component. This issue is the result of an incomplete fix for CVE-2024-49761.
AI Analysis
Technical Summary
CVE-2025-10990 is a vulnerability identified in the REXML library, a Ruby-based XML parser widely used in various applications for XML document processing. The flaw arises from inefficient regular expression handling when parsing hex numeric character references (e.g., &#x...;) within XML content. Specifically, the regex used to process these references exhibits excessive backtracking or complexity, which can be exploited by a crafted XML input to cause a Regular Expression Denial of Service (ReDoS). This results in the parser consuming excessive CPU resources, leading to degraded performance or complete unavailability of the service relying on REXML. The vulnerability is a regression or incomplete remediation of a prior issue (CVE-2024-49761), indicating that the fix applied earlier did not fully address the underlying regex inefficiency. The CVSS v3.1 score of 7.5 reflects a high severity, with an attack vector that is network accessible (AV:N), requires no privileges (PR:N), and no user interaction (UI:N). The impact is solely on availability (A:H), with no confidentiality or integrity loss. No patches or exploits are currently documented, but the risk remains significant due to the ease of exploitation and potential for service disruption in applications processing untrusted XML data.
Potential Impact
The primary impact of CVE-2025-10990 is on the availability of systems using the REXML library for XML parsing. An attacker can remotely send malicious XML documents containing crafted hex numeric character references that trigger the inefficient regex, causing excessive CPU consumption and potential service outages. This can disrupt web services, APIs, or any backend systems relying on REXML, leading to denial of service conditions. Organizations that process large volumes of XML data or expose XML parsing functionality to untrusted sources are particularly vulnerable. While confidentiality and integrity are not directly affected, the availability impact can have cascading effects on business operations, customer trust, and compliance with service level agreements. The lack of authentication or user interaction requirements lowers the barrier for exploitation, increasing the threat surface. Critical infrastructure, financial services, and cloud providers using REXML may face operational disruptions if targeted.
Mitigation Recommendations
To mitigate CVE-2025-10990, organizations should monitor for and apply official patches or updates to the REXML library as soon as they become available. In the absence of patches, consider implementing input validation to reject or sanitize XML documents containing suspicious or excessive hex numeric character references. Employ resource limiting techniques such as CPU timeouts, request rate limiting, and sandboxing XML parsing operations to prevent resource exhaustion. Where feasible, replace REXML with alternative XML parsers that do not exhibit this regex inefficiency. Additionally, implement network-level protections like web application firewalls (WAFs) to detect and block malformed XML payloads. Regularly audit and review XML processing code to ensure robust error handling and resilience against ReDoS attacks. Finally, maintain comprehensive monitoring and alerting on system performance metrics to detect early signs of exploitation attempts.
Affected Countries
United States, Germany, United Kingdom, Japan, South Korea, France, Canada, Australia, India, Brazil
CVE-2025-10990: Inefficient Regular Expression Complexity
Description
A flaw was found in REXML. A remote attacker could exploit inefficient regular expression (regex) parsing when processing hex numeric character references (&#x...;) in XML documents. This could lead to a Regular Expression Denial of Service (ReDoS), impacting the availability of the affected component. This issue is the result of an incomplete fix for CVE-2024-49761.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-10990 is a vulnerability identified in the REXML library, a Ruby-based XML parser widely used in various applications for XML document processing. The flaw arises from inefficient regular expression handling when parsing hex numeric character references (e.g., &#x...;) within XML content. Specifically, the regex used to process these references exhibits excessive backtracking or complexity, which can be exploited by a crafted XML input to cause a Regular Expression Denial of Service (ReDoS). This results in the parser consuming excessive CPU resources, leading to degraded performance or complete unavailability of the service relying on REXML. The vulnerability is a regression or incomplete remediation of a prior issue (CVE-2024-49761), indicating that the fix applied earlier did not fully address the underlying regex inefficiency. The CVSS v3.1 score of 7.5 reflects a high severity, with an attack vector that is network accessible (AV:N), requires no privileges (PR:N), and no user interaction (UI:N). The impact is solely on availability (A:H), with no confidentiality or integrity loss. No patches or exploits are currently documented, but the risk remains significant due to the ease of exploitation and potential for service disruption in applications processing untrusted XML data.
Potential Impact
The primary impact of CVE-2025-10990 is on the availability of systems using the REXML library for XML parsing. An attacker can remotely send malicious XML documents containing crafted hex numeric character references that trigger the inefficient regex, causing excessive CPU consumption and potential service outages. This can disrupt web services, APIs, or any backend systems relying on REXML, leading to denial of service conditions. Organizations that process large volumes of XML data or expose XML parsing functionality to untrusted sources are particularly vulnerable. While confidentiality and integrity are not directly affected, the availability impact can have cascading effects on business operations, customer trust, and compliance with service level agreements. The lack of authentication or user interaction requirements lowers the barrier for exploitation, increasing the threat surface. Critical infrastructure, financial services, and cloud providers using REXML may face operational disruptions if targeted.
Mitigation Recommendations
To mitigate CVE-2025-10990, organizations should monitor for and apply official patches or updates to the REXML library as soon as they become available. In the absence of patches, consider implementing input validation to reject or sanitize XML documents containing suspicious or excessive hex numeric character references. Employ resource limiting techniques such as CPU timeouts, request rate limiting, and sandboxing XML parsing operations to prevent resource exhaustion. Where feasible, replace REXML with alternative XML parsers that do not exhibit this regex inefficiency. Additionally, implement network-level protections like web application firewalls (WAFs) to detect and block malformed XML payloads. Regularly audit and review XML processing code to ensure robust error handling and resilience against ReDoS attacks. Finally, maintain comprehensive monitoring and alerting on system performance metrics to detect early signs of exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- redhat
- Date Reserved
- 2025-09-25T17:30:55.821Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a19ef732ffcdb8a232d2bb
Added to database: 2/27/2026, 1:41:11 PM
Last enriched: 2/27/2026, 1:56:06 PM
Last updated: 4/15/2026, 12:05:17 PM
Views: 168
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.