Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24928: CWE-121 Stack-based Buffer Overflow in xmlsoft libxml2

0
High
VulnerabilityCVE-2025-24928cvecve-2025-24928cwe-121
Published: Tue Feb 18 2025 (02/18/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: xmlsoft
Product: libxml2

Description

libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 23:56:04 UTC

Technical Analysis

CVE-2025-24928 is a stack-based buffer overflow vulnerability identified in the xmlSnprintfElements function of the valid.c source file in libxml2, a widely used XML parsing library maintained by xmlsoft. The flaw exists in versions prior to 2.12.10 and in the 2.13.x series before 2.13.6. The vulnerability arises during Document Type Definition (DTD) validation when processing untrusted XML documents or DTDs. Specifically, improper handling of data during the formatting of XML elements leads to a buffer overflow on the stack, which can be exploited to overwrite memory and potentially execute arbitrary code. This vulnerability is similar in nature to CVE-2017-9047, indicating a recurring issue in the DTD validation logic of libxml2. Exploitation does not require authentication or user interaction but does require that the vulnerable system perform DTD validation on untrusted input, which is a common scenario in XML processing applications such as web services, document converters, and embedded devices. The CVSS v3.1 base score of 7.8 reflects a high severity due to the potential for complete confidentiality and integrity compromise, with no impact on availability. No public exploits are known at this time, but the vulnerability's characteristics make it a significant risk if left unpatched. The absence of patch links in the provided data suggests that users should monitor official xmlsoft channels for updates or apply available patches in versions 2.12.10 and 2.13.6 or later.

Potential Impact

The vulnerability allows attackers to execute arbitrary code or cause memory corruption by exploiting a stack-based buffer overflow during DTD validation of untrusted XML inputs. This can lead to full compromise of confidentiality and integrity of affected systems, enabling data theft, unauthorized modifications, or further lateral movement within networks. Systems that automatically parse and validate XML documents with DTDs, such as web servers, middleware, document processing tools, and embedded devices, are at risk. The impact is particularly severe in environments where XML inputs originate from untrusted sources, such as internet-facing services or document ingestion pipelines. Although availability is not directly affected, successful exploitation could lead to system instability or crashes as a side effect. Organizations that rely heavily on libxml2 for XML processing without strict input validation or sandboxing are vulnerable to targeted attacks, potentially affecting sensitive data and critical infrastructure operations.

Mitigation Recommendations

Organizations should immediately update libxml2 to version 2.12.10 or 2.13.6 and later, where the vulnerability is patched. Until updates are applied, disable DTD validation for XML inputs from untrusted sources to prevent exploitation. Implement strict input validation and sanitization to reject or isolate XML documents containing DTDs from untrusted origins. Employ sandboxing or process isolation for XML parsing components to limit the impact of potential exploitation. Monitor XML processing logs for unusual or malformed DTDs that could indicate exploitation attempts. For embedded or legacy systems where patching is challenging, consider replacing libxml2 with alternative XML parsers that do not perform DTD validation or have no known similar vulnerabilities. Maintain up-to-date intrusion detection and prevention systems with signatures targeting XML-based attacks. Finally, establish a vulnerability management process to track and promptly apply security updates for critical libraries like libxml2.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-01-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68806268ad5a09ad0006f89c

Added to database: 7/23/2025, 4:17:44 AM

Last enriched: 2/26/2026, 11:56:04 PM

Last updated: 3/24/2026, 11:47:48 PM

Views: 428

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses