Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11731: Access of Resource Using Incompatible Type ('Type Confusion') in Red Hat Red Hat Enterprise Linux 10

0
Low
VulnerabilityCVE-2025-11731cvecve-2025-11731
Published: Tue Oct 14 2025 (10/14/2025, 06:02:35 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A flaw was found in the exsltFuncResultComp() function of libxslt, which handles EXSLT <func:result> elements during stylesheet parsing. Due to improper type handling, the function may treat an XML document node as a regular XML element node, resulting in a type confusion. This can cause unexpected memory reads and potential crashes. While difficult to exploit, the flaw could lead to application instability or denial of service.

AI-Powered Analysis

AILast updated: 10/14/2025, 06:19:55 UTC

Technical Analysis

CVE-2025-11731 is a vulnerability identified in the libxslt library component of Red Hat Enterprise Linux 10. The issue resides in the exsltFuncResultComp() function, which processes EXSLT <func:result> elements during XML stylesheet parsing. The vulnerability is a type confusion flaw where the function improperly handles XML node types, treating an XML document node as a regular XML element node. This misclassification leads to unexpected memory reads, potentially causing application crashes or denial of service conditions. The flaw does not allow for privilege escalation, code execution, or data leakage, as it solely affects availability through instability. Exploitation requires an attacker to supply crafted XML stylesheets that trigger the vulnerable code path, which is non-trivial due to the complexity of the XML processing context and the need for user interaction. The CVSS v3.1 score is 3.1, reflecting low severity with network attack vector, high attack complexity, no privileges required, and user interaction needed. No known exploits have been reported in the wild, and no patches were linked at the time of disclosure, though Red Hat is expected to release updates. This vulnerability primarily threatens applications and services that utilize libxslt for XML transformations, especially those processing untrusted or external XML content.

Potential Impact

For European organizations, the primary impact of CVE-2025-11731 is potential application instability or denial of service in systems running Red Hat Enterprise Linux 10 that rely on libxslt for XML processing. This could affect web services, middleware, or internal applications that perform XML transformations using EXSLT functions. While the vulnerability does not compromise confidentiality or integrity, service disruptions could impact business continuity, especially in sectors dependent on high availability such as finance, telecommunications, and critical infrastructure. Organizations processing untrusted XML inputs are at higher risk. The difficulty of exploitation and requirement for user interaction reduce the likelihood of widespread attacks, but targeted attempts could cause localized outages. The low CVSS score indicates limited overall risk, but operational impacts could be significant if exploited in critical systems.

Mitigation Recommendations

Organizations should monitor Red Hat advisories and apply patches promptly once available to address CVE-2025-11731. Until patches are deployed, restrict or validate XML stylesheet inputs to prevent processing of untrusted or malicious EXSLT <func:result> elements. Employ application-layer filtering or sandboxing for XML processing components to limit the impact of crashes. Review and harden XML processing workflows to minimize exposure to crafted XML content. Implement robust monitoring to detect abnormal application crashes or service interruptions related to XML transformations. Consider upgrading libxslt to versions where the flaw is fixed or using alternative XML processing libraries if feasible. Additionally, educate developers and system administrators about safe XML handling practices to reduce the risk of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-10-14T05:28:37.404Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68edeb573aa78542cebbacfc

Added to database: 10/14/2025, 6:19:03 AM

Last enriched: 10/14/2025, 6:19:55 AM

Last updated: 10/14/2025, 7:28:05 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats