CVE-2025-49795: Expired Pointer Dereference
A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service.
AI Analysis
Technical Summary
This vulnerability (CVE-2025-49795) is a NULL pointer dereference in libxml2 during XPath XML expression processing. An attacker can craft malicious XML input that triggers this flaw, resulting in a denial of service by crashing the affected application or system. The issue affects Red Hat Enterprise Linux 10 and related products using libxml2. Red Hat has released security updates that fix this vulnerability alongside other libxml2 issues. The CVSS 3.1 base score is 7.5 (high severity), reflecting network attack vector, no privileges required, no user interaction, and impact limited to availability (denial of service).
Potential Impact
Successful exploitation leads to denial of service, causing affected applications or systems to crash or become unavailable. There is no impact on confidentiality or integrity reported. No known exploits in the wild have been documented. The vulnerability affects multiple Red Hat Enterprise Linux 10 variants and Red Hat JBoss Core Services that bundle libxml2.
Mitigation Recommendations
Red Hat has released official security updates for libxml2 that address this vulnerability. Users and administrators should apply the updated libxml2 packages as provided in Red Hat Advisory RHSA-2025:10630 and related errata. The vendor advisory confirms the availability of patches and recommends updating affected systems promptly. No additional mitigation steps are indicated beyond applying the official fixes.
CVE-2025-49795: Expired Pointer Dereference
Description
A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This vulnerability (CVE-2025-49795) is a NULL pointer dereference in libxml2 during XPath XML expression processing. An attacker can craft malicious XML input that triggers this flaw, resulting in a denial of service by crashing the affected application or system. The issue affects Red Hat Enterprise Linux 10 and related products using libxml2. Red Hat has released security updates that fix this vulnerability alongside other libxml2 issues. The CVSS 3.1 base score is 7.5 (high severity), reflecting network attack vector, no privileges required, no user interaction, and impact limited to availability (denial of service).
Potential Impact
Successful exploitation leads to denial of service, causing affected applications or systems to crash or become unavailable. There is no impact on confidentiality or integrity reported. No known exploits in the wild have been documented. The vulnerability affects multiple Red Hat Enterprise Linux 10 variants and Red Hat JBoss Core Services that bundle libxml2.
Mitigation Recommendations
Red Hat has released official security updates for libxml2 that address this vulnerability. Users and administrators should apply the updated libxml2 packages as provided in Red Hat Advisory RHSA-2025:10630 and related errata. The vendor advisory confirms the availability of patches and recommends updating affected systems promptly. No additional mitigation steps are indicated beyond applying the official fixes.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2025-06-10T22:17:05.286Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68503980a8c9212743844972
Added to database: 6/16/2025, 3:34:24 PM
Last enriched: 4/22/2026, 6:18:34 AM
Last updated: 5/8/2026, 2:36:02 PM
Views: 81
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.