Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49794: Expired Pointer Dereference

0
Critical
VulnerabilityCVE-2025-49794cvecve-2025-49794
Published: Mon Jun 16 2025 (06/16/2025, 15:24:31 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path="..."/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/22/2026, 06:18:27 UTC

Technical Analysis

CVE-2025-49794 is a heap use-after-free vulnerability in libxml2 triggered by parsing specific XPath elements under certain XML schematron conditions. This vulnerability can lead to denial of service by crashing applications that use libxml2. Red Hat has released updated libxml2 packages for Red Hat Enterprise Linux 8 and 10 that address this issue along with other related vulnerabilities. The vulnerability has a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H), indicating network exploitable with low attack complexity and no privileges or user interaction required, causing high impact on integrity and availability. The vendor advisories provide detailed package updates and instructions for remediation.

Potential Impact

The vulnerability allows an attacker to cause a denial of service by crashing applications that parse maliciously crafted XML documents using libxml2. The CVSS score of 9.1 reflects critical severity with high impact on integrity and availability but no confidentiality impact. There are no known exploits in the wild at the time of the advisory. The issue affects multiple architectures and versions of Red Hat Enterprise Linux 8 and 10 and related Red Hat products using libxml2.

Mitigation Recommendations

Red Hat has released official security updates for libxml2 that fix CVE-2025-49794. Users of Red Hat Enterprise Linux 8 and 10 should apply the updated libxml2 packages as detailed in the Red Hat advisories RHSA-2025:10630 and RHSA-2025:10698. The advisories include instructions and links to updated packages for all affected architectures. Applying these updates is the recommended and supported remediation. Patch status is confirmed and official fixes are available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-06-10T22:17:05.286Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6850408fa8c9212743845411

Added to database: 6/16/2025, 4:04:31 PM

Last enriched: 4/22/2026, 6:18:27 AM

Last updated: 5/9/2026, 8:58:57 AM

Views: 626

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses