Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49795: Expired Pointer Dereference

0
High
VulnerabilityCVE-2025-49795cvecve-2025-49795
Published: Mon Jun 16 2025 (06/16/2025, 15:19:29 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 14:12:45 UTC

Technical Analysis

CVE-2025-49795 is a vulnerability identified in libxml2, a widely used XML parsing library, specifically in its handling of XPath XML expressions. The flaw is a NULL pointer dereference, which occurs when the library attempts to access memory through a pointer that has been set to NULL, leading to a crash. This vulnerability can be triggered by an attacker who crafts a malicious XML input containing specially designed XPath expressions that cause the dereference. The impact of this flaw is a denial of service (DoS), where the affected application or system component using libxml2 becomes unresponsive or crashes, potentially disrupting services. The vulnerability is remotely exploitable without requiring any authentication or user interaction, making it easier for attackers to launch attacks over the network. The CVSS v3.1 base score is 7.5, reflecting high severity due to the network attack vector, low attack complexity, and the absence of required privileges or user interaction. The vulnerability affects Red Hat Enterprise Linux 10, which bundles libxml2, and potentially other systems using vulnerable versions of the library. As of the publication date, no known exploits have been reported in the wild, but the risk remains significant given the library's widespread use in enterprise and server environments. The vulnerability was reserved and published in June 2025, with Red Hat as the assigner. No patches or mitigations were listed at the time of reporting, emphasizing the need for vigilance and prompt patching once updates are released.

Potential Impact

The primary impact of CVE-2025-49795 is denial of service, which can disrupt critical services relying on XML processing through libxml2. Organizations using Red Hat Enterprise Linux 10 or other affected systems may experience application crashes or system instability, leading to downtime and potential loss of availability. This can affect web servers, middleware, enterprise applications, and any software components that parse XML data using libxml2. The denial of service could be leveraged as part of a larger attack to degrade service availability or as a distraction while other attacks are conducted. Although the vulnerability does not directly compromise confidentiality or integrity, the loss of availability in critical systems can have cascading effects on business operations, customer trust, and regulatory compliance. The ease of exploitation without authentication or user interaction increases the threat level, especially for internet-facing services. Organizations with high availability requirements or those in sectors such as finance, healthcare, government, and telecommunications are particularly at risk.

Mitigation Recommendations

1. Monitor Red Hat and libxml2 project advisories closely and apply security patches immediately once they become available to address CVE-2025-49795. 2. Restrict and validate XML input sources rigorously to minimize exposure to untrusted or malicious XML data, employing input sanitization and schema validation where possible. 3. Employ runtime application self-protection (RASP) or intrusion detection systems (IDS) that can detect abnormal crashes or unusual XML processing behavior indicative of exploitation attempts. 4. Consider isolating or sandboxing applications that process XML data to contain potential crashes and prevent system-wide impact. 5. Review and update incident response plans to include scenarios involving denial of service caused by XML parsing vulnerabilities. 6. For environments where immediate patching is not feasible, implement network-level controls such as web application firewalls (WAFs) with custom rules to detect and block suspicious XML payloads targeting XPath expressions. 7. Conduct regular security assessments and fuzz testing of XML processing components to identify and remediate similar vulnerabilities proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-06-10T22:17:05.286Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68503980a8c9212743844972

Added to database: 6/16/2025, 3:34:24 PM

Last enriched: 2/27/2026, 2:12:45 PM

Last updated: 3/24/2026, 4:15:58 PM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses