Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49794: Expired Pointer Dereference

0
Critical
VulnerabilityCVE-2025-49794cvecve-2025-49794
Published: Mon Jun 16 2025 (06/16/2025, 15:24:31 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path="..."/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 21:42:14 UTC

Technical Analysis

CVE-2025-49794 is a use-after-free vulnerability discovered in libxml2, a widely used XML parsing library integral to many applications and operating systems, including Red Hat Enterprise Linux 10. The flaw occurs specifically during the parsing of XPath elements when XML schematron documents contain <sch:name path="..."/> schema elements. Under these conditions, libxml2 improperly manages memory, leading to dereferencing of expired pointers. This memory mismanagement can cause the affected program to crash or exhibit undefined behavior, such as memory corruption. The vulnerability is remotely exploitable without requiring authentication or user interaction, as it can be triggered by processing a maliciously crafted XML document. The CVSS v3.1 base score is 9.1, indicating critical severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), high integrity impact (I:H), and high availability impact (A:H). While no public exploits have been reported yet, the potential for denial of service or further exploitation through memory corruption is significant. The vulnerability affects Red Hat Enterprise Linux 10, which bundles libxml2, and likely other systems using vulnerable versions of libxml2. The absence of patches at the time of reporting necessitates immediate attention to monitoring and mitigation.

Potential Impact

The primary impact of CVE-2025-49794 is on system integrity and availability. Exploitation can cause application crashes, leading to denial of service conditions in services relying on libxml2 for XML processing. In scenarios where libxml2 is used in critical infrastructure or backend services, this could disrupt operations or cause cascading failures. The memory corruption potential also raises the risk of arbitrary code execution or privilege escalation if combined with other vulnerabilities, although this has not been confirmed. Since the vulnerability requires no authentication or user interaction, attackers can remotely exploit exposed XML processing endpoints, increasing the attack surface. Organizations worldwide that depend on Red Hat Enterprise Linux 10 or other platforms using vulnerable libxml2 versions face risks of service disruption and potential compromise, especially in environments processing untrusted XML inputs such as web services, APIs, and document processing systems.

Mitigation Recommendations

Organizations should monitor Red Hat and libxml2 project advisories closely for official patches and apply them promptly once available. Until patches are released, implement strict input validation and sanitization for XML inputs, particularly those involving XPath and schematron elements, to block maliciously crafted XML documents. Employ network-level protections such as web application firewalls (WAFs) to detect and block suspicious XML payloads. Restrict exposure of XML processing services to trusted networks where possible. Consider sandboxing or isolating applications that process untrusted XML to limit the impact of crashes or exploitation attempts. Conduct thorough code reviews and testing for custom XML processing logic to identify and remediate similar memory management issues. Maintain up-to-date backups and incident response plans to recover from potential denial of service or compromise scenarios.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-06-10T22:17:05.286Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6850408fa8c9212743845411

Added to database: 6/16/2025, 4:04:31 PM

Last enriched: 3/20/2026, 9:42:14 PM

Last updated: 3/23/2026, 2:02:03 PM

Views: 580

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses