CVE-2025-24855: CWE-416 Use After Free in xmlsoft libxslt
numbers.c in libxslt before 1.1.43 has a use-after-free because, in nested XPath evaluations, an XPath context node can be modified but never restored. This is related to xsltNumberFormatGetValue, xsltEvalXPathPredicate, xsltEvalXPathStringNs, and xsltComputeSortResultInternal.
AI Analysis
Technical Summary
CVE-2025-24855 is a high-severity use-after-free vulnerability (CWE-416) found in the xmlsoft project's libxslt library, specifically in versions prior to 1.1.43. The vulnerability arises in the numbers.c component during nested XPath evaluations, where the XPath context node can be modified but is never restored properly. This flaw affects functions such as xsltNumberFormatGetValue, xsltEvalXPathPredicate, xsltEvalXPathStringNs, and xsltComputeSortResultInternal. The improper handling of the XPath context node leads to a use-after-free condition, which can cause memory corruption. According to the CVSS v3.1 vector (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H), the attack requires local access (AV:L), high attack complexity (AC:H), no privileges (PR:N), and no user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. The impact affects integrity and availability but not confidentiality, potentially allowing an attacker to execute arbitrary code or cause denial of service. No known exploits are currently reported in the wild, and no patches are linked yet, indicating the vulnerability is relatively new. The vulnerability is critical for applications relying on libxslt for XML transformations, especially those processing untrusted XML inputs, as exploitation could lead to system compromise or service disruption.
Potential Impact
For European organizations, the impact of CVE-2025-24855 can be significant, particularly for entities that utilize libxslt in their software stacks, such as web servers, content management systems, or custom XML processing tools. Exploitation could lead to integrity violations by allowing attackers to manipulate or corrupt data processed by XML transformations. Additionally, availability could be compromised through crashes or denial-of-service conditions. Since the attack requires local access and has high complexity, the immediate risk is lower for remote attackers; however, insider threats or attackers who gain initial footholds could leverage this vulnerability to escalate privileges or disrupt services. Industries such as finance, healthcare, and government, which often process XML data and require high data integrity and availability, may face operational risks. The lack of confidentiality impact reduces the risk of data leakage but does not diminish the potential for service disruption or unauthorized code execution. The vulnerability's presence in widely used open-source libraries means that many European organizations could be indirectly affected through third-party software dependencies.
Mitigation Recommendations
European organizations should take proactive steps to mitigate this vulnerability beyond generic patching advice. First, conduct a thorough inventory of all systems and applications using libxslt, including indirect dependencies in software stacks. Since no patch is currently linked, consider applying temporary mitigations such as restricting local access to systems running vulnerable libxslt versions to trusted personnel only. Employ application-level sandboxing or containerization to limit the impact of potential exploitation. Review and harden XML input validation and sanitization processes to minimize the risk of malicious XPath expressions triggering the vulnerability. Monitor system logs and memory usage for unusual behavior indicative of exploitation attempts. Engage with software vendors and open-source communities to track patch releases and apply updates promptly once available. Additionally, implement strict access controls and endpoint detection and response (EDR) solutions to detect and prevent local exploitation attempts. For critical systems, consider disabling or replacing libxslt-dependent functionality temporarily if feasible.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Switzerland
CVE-2025-24855: CWE-416 Use After Free in xmlsoft libxslt
Description
numbers.c in libxslt before 1.1.43 has a use-after-free because, in nested XPath evaluations, an XPath context node can be modified but never restored. This is related to xsltNumberFormatGetValue, xsltEvalXPathPredicate, xsltEvalXPathStringNs, and xsltComputeSortResultInternal.
AI-Powered Analysis
Technical Analysis
CVE-2025-24855 is a high-severity use-after-free vulnerability (CWE-416) found in the xmlsoft project's libxslt library, specifically in versions prior to 1.1.43. The vulnerability arises in the numbers.c component during nested XPath evaluations, where the XPath context node can be modified but is never restored properly. This flaw affects functions such as xsltNumberFormatGetValue, xsltEvalXPathPredicate, xsltEvalXPathStringNs, and xsltComputeSortResultInternal. The improper handling of the XPath context node leads to a use-after-free condition, which can cause memory corruption. According to the CVSS v3.1 vector (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H), the attack requires local access (AV:L), high attack complexity (AC:H), no privileges (PR:N), and no user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. The impact affects integrity and availability but not confidentiality, potentially allowing an attacker to execute arbitrary code or cause denial of service. No known exploits are currently reported in the wild, and no patches are linked yet, indicating the vulnerability is relatively new. The vulnerability is critical for applications relying on libxslt for XML transformations, especially those processing untrusted XML inputs, as exploitation could lead to system compromise or service disruption.
Potential Impact
For European organizations, the impact of CVE-2025-24855 can be significant, particularly for entities that utilize libxslt in their software stacks, such as web servers, content management systems, or custom XML processing tools. Exploitation could lead to integrity violations by allowing attackers to manipulate or corrupt data processed by XML transformations. Additionally, availability could be compromised through crashes or denial-of-service conditions. Since the attack requires local access and has high complexity, the immediate risk is lower for remote attackers; however, insider threats or attackers who gain initial footholds could leverage this vulnerability to escalate privileges or disrupt services. Industries such as finance, healthcare, and government, which often process XML data and require high data integrity and availability, may face operational risks. The lack of confidentiality impact reduces the risk of data leakage but does not diminish the potential for service disruption or unauthorized code execution. The vulnerability's presence in widely used open-source libraries means that many European organizations could be indirectly affected through third-party software dependencies.
Mitigation Recommendations
European organizations should take proactive steps to mitigate this vulnerability beyond generic patching advice. First, conduct a thorough inventory of all systems and applications using libxslt, including indirect dependencies in software stacks. Since no patch is currently linked, consider applying temporary mitigations such as restricting local access to systems running vulnerable libxslt versions to trusted personnel only. Employ application-level sandboxing or containerization to limit the impact of potential exploitation. Review and harden XML input validation and sanitization processes to minimize the risk of malicious XPath expressions triggering the vulnerability. Monitor system logs and memory usage for unusual behavior indicative of exploitation attempts. Engage with software vendors and open-source communities to track patch releases and apply updates promptly once available. Additionally, implement strict access controls and endpoint detection and response (EDR) solutions to detect and prevent local exploitation attempts. For critical systems, consider disabling or replacing libxslt-dependent functionality temporarily if feasible.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-01-26T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 688d9167ad5a09ad00d109f6
Added to database: 8/2/2025, 4:17:43 AM
Last enriched: 8/2/2025, 4:32:44 AM
Last updated: 8/2/2025, 10:52:35 AM
Views: 7
Related Threats
CVE-2025-7710: CWE-288 Authentication Bypass Using an Alternate Path or Channel in Brave Brave Conversion Engine (PRO)
CriticalCVE-2025-7500: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in oceanwp Ocean Social Sharing
MediumCVE-2025-8467: SQL Injection in code-projects Wazifa System
MediumCVE-2025-8488: CWE-862 Missing Authorization in brainstormforce Ultimate Addons for Elementor (Formerly Elementor Header & Footer Builder)
MediumCVE-2025-6722: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in bitslip6 BitFire Security – Firewall, WAF, Bot/Spam Blocker, Login Security
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.