Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49795: Expired Pointer Dereference

0
High
VulnerabilityCVE-2025-49795cvecve-2025-49795
Published: Mon Jun 16 2025 (06/16/2025, 15:19:29 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/22/2026, 06:18:34 UTC

Technical Analysis

This vulnerability (CVE-2025-49795) is a NULL pointer dereference in libxml2 during XPath XML expression processing. An attacker can craft malicious XML input that triggers this flaw, resulting in a denial of service by crashing the affected application or system. The issue affects Red Hat Enterprise Linux 10 and related products using libxml2. Red Hat has released security updates that fix this vulnerability alongside other libxml2 issues. The CVSS 3.1 base score is 7.5 (high severity), reflecting network attack vector, no privileges required, no user interaction, and impact limited to availability (denial of service).

Potential Impact

Successful exploitation leads to denial of service, causing affected applications or systems to crash or become unavailable. There is no impact on confidentiality or integrity reported. No known exploits in the wild have been documented. The vulnerability affects multiple Red Hat Enterprise Linux 10 variants and Red Hat JBoss Core Services that bundle libxml2.

Mitigation Recommendations

Red Hat has released official security updates for libxml2 that address this vulnerability. Users and administrators should apply the updated libxml2 packages as provided in Red Hat Advisory RHSA-2025:10630 and related errata. The vendor advisory confirms the availability of patches and recommends updating affected systems promptly. No additional mitigation steps are indicated beyond applying the official fixes.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-06-10T22:17:05.286Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68503980a8c9212743844972

Added to database: 6/16/2025, 3:34:24 PM

Last enriched: 4/22/2026, 6:18:34 AM

Last updated: 5/8/2026, 2:36:02 PM

Views: 81

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses