Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12084: Vulnerability in Python Software Foundation CPython

0
Medium
VulnerabilityCVE-2025-12084cvecve-2025-12084
Published: Wed Dec 03 2025 (12/03/2025, 18:55:32 UTC)
Source: CVE Database V5
Vendor/Project: Python Software Foundation
Product: CPython

Description

When building nested elements using xml.dom.minidom methods such as appendChild() that have a dependency on _clear_id_cache() the algorithm is quadratic. Availability can be impacted when building excessively nested documents.

AI-Powered Analysis

AILast updated: 01/14/2026, 19:10:22 UTC

Technical Analysis

CVE-2025-12084 is a vulnerability identified in the Python Software Foundation's CPython interpreter, specifically affecting the xml.dom.minidom module used for XML document manipulation. The vulnerability stems from the algorithmic complexity of the _clear_id_cache() function, which is invoked during operations like appendChild() when building nested XML elements. The algorithm exhibits quadratic time complexity relative to the depth of the XML document's nesting. This inefficiency can be exploited by an attacker who supplies an XML document with excessively nested elements, causing the parser to consume disproportionate CPU resources and degrade system availability. The vulnerability affects CPython versions from the initial release up to 3.15.0a1. The CVSS 4.0 base score is 6.3 (medium severity), reflecting the network attack vector, low attack complexity, no privileges or user interaction required, and a limited impact on availability. There is no impact on confidentiality or integrity. No known exploits have been reported in the wild. The vulnerability is categorized under CWE-407 (Improper Resource Shutdown or Release), indicating that inefficient resource handling leads to potential denial-of-service conditions. Since XML is widely used for configuration, data interchange, and web services, applications using vulnerable CPython versions to parse or construct XML documents are at risk. The vulnerability does not require authentication or user interaction, making it feasible for remote exploitation if the application processes untrusted XML inputs. However, the absence of known exploits and the medium severity suggest moderate urgency. No official patches are currently linked, so mitigation relies on best practices and monitoring for updates from the Python Software Foundation.

Potential Impact

For European organizations, the primary impact of CVE-2025-12084 is on availability due to potential denial-of-service conditions triggered by processing crafted XML documents with deep nesting. This can affect web services, APIs, and applications that rely on Python's xml.dom.minidom module for XML parsing or generation. Sectors such as finance, telecommunications, healthcare, and government, which often use XML for data interchange and configuration, may experience service disruptions or degraded performance. The vulnerability could be exploited remotely without authentication, increasing the risk surface. While confidentiality and integrity are not directly impacted, availability issues can lead to operational downtime, loss of productivity, and reputational damage. Organizations using vulnerable CPython versions in critical infrastructure or customer-facing services are particularly at risk. The lack of known exploits reduces immediate threat but does not eliminate the potential for future attacks, especially as exploit techniques evolve. The medium severity rating indicates that while the threat is not critical, it warrants timely attention to prevent denial-of-service scenarios.

Mitigation Recommendations

European organizations should implement several specific mitigations to address CVE-2025-12084 effectively: 1) Monitor and restrict XML input sources to trusted entities, applying strict validation to prevent excessively nested XML documents from being processed. 2) Implement XML parsing limits such as maximum depth and size constraints within application logic or by using alternative XML parsers that support such safeguards. 3) Upgrade to the latest CPython versions once patches addressing this vulnerability are released by the Python Software Foundation. 4) Where immediate upgrading is not feasible, consider patching or backporting fixes if available from trusted sources. 5) Employ runtime monitoring and anomaly detection to identify unusual CPU or memory usage patterns indicative of exploitation attempts. 6) Isolate XML processing components in sandboxed environments to limit the impact of potential denial-of-service conditions. 7) Educate developers and system administrators about the risks of processing untrusted XML and encourage secure coding practices. 8) Review and update incident response plans to include scenarios involving denial-of-service via XML processing. These targeted actions go beyond generic advice by focusing on controlling XML input complexity, proactive monitoring, and timely patch management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
PSF
Date Reserved
2025-10-22T16:06:55.078Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693088877d648701e003bbc8

Added to database: 12/3/2025, 6:59:19 PM

Last enriched: 1/14/2026, 7:10:22 PM

Last updated: 1/19/2026, 8:38:02 PM

Views: 214

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats