CVE-2025-49794: Expired Pointer Dereference
A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path="..."/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.
AI Analysis
Technical Summary
CVE-2025-49794 is a heap use-after-free vulnerability in libxml2 triggered by parsing specific XPath elements under certain XML schematron conditions. This vulnerability can lead to denial of service by crashing applications that use libxml2. Red Hat has released updated libxml2 packages for Red Hat Enterprise Linux 8 and 10 that address this issue along with other related vulnerabilities. The vulnerability has a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H), indicating network exploitable with low attack complexity and no privileges or user interaction required, causing high impact on integrity and availability. The vendor advisories provide detailed package updates and instructions for remediation.
Potential Impact
The vulnerability allows an attacker to cause a denial of service by crashing applications that parse maliciously crafted XML documents using libxml2. The CVSS score of 9.1 reflects critical severity with high impact on integrity and availability but no confidentiality impact. There are no known exploits in the wild at the time of the advisory. The issue affects multiple architectures and versions of Red Hat Enterprise Linux 8 and 10 and related Red Hat products using libxml2.
Mitigation Recommendations
Red Hat has released official security updates for libxml2 that fix CVE-2025-49794. Users of Red Hat Enterprise Linux 8 and 10 should apply the updated libxml2 packages as detailed in the Red Hat advisories RHSA-2025:10630 and RHSA-2025:10698. The advisories include instructions and links to updated packages for all affected architectures. Applying these updates is the recommended and supported remediation. Patch status is confirmed and official fixes are available.
CVE-2025-49794: Expired Pointer Dereference
Description
A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path="..."/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-49794 is a heap use-after-free vulnerability in libxml2 triggered by parsing specific XPath elements under certain XML schematron conditions. This vulnerability can lead to denial of service by crashing applications that use libxml2. Red Hat has released updated libxml2 packages for Red Hat Enterprise Linux 8 and 10 that address this issue along with other related vulnerabilities. The vulnerability has a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H), indicating network exploitable with low attack complexity and no privileges or user interaction required, causing high impact on integrity and availability. The vendor advisories provide detailed package updates and instructions for remediation.
Potential Impact
The vulnerability allows an attacker to cause a denial of service by crashing applications that parse maliciously crafted XML documents using libxml2. The CVSS score of 9.1 reflects critical severity with high impact on integrity and availability but no confidentiality impact. There are no known exploits in the wild at the time of the advisory. The issue affects multiple architectures and versions of Red Hat Enterprise Linux 8 and 10 and related Red Hat products using libxml2.
Mitigation Recommendations
Red Hat has released official security updates for libxml2 that fix CVE-2025-49794. Users of Red Hat Enterprise Linux 8 and 10 should apply the updated libxml2 packages as detailed in the Red Hat advisories RHSA-2025:10630 and RHSA-2025:10698. The advisories include instructions and links to updated packages for all affected architectures. Applying these updates is the recommended and supported remediation. Patch status is confirmed and official fixes are available.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2025-06-10T22:17:05.286Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6850408fa8c9212743845411
Added to database: 6/16/2025, 4:04:31 PM
Last enriched: 4/22/2026, 6:18:27 AM
Last updated: 5/9/2026, 8:58:57 AM
Views: 626
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.