CVE-2025-58767: CWE-400: Uncontrolled Resource Consumption in ruby rexml
REXML is an XML toolkit for Ruby. The REXML gems from 3.3.3 to 3.4.1 has a DoS vulnerability when parsing XML containing multiple XML declarations. If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities. The REXML gem 3.4.2 or later include the patches to fix these vulnerabilities.
AI Analysis
Technical Summary
CVE-2025-58767 is a denial-of-service (DoS) vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting the REXML gem, an XML parsing toolkit for the Ruby programming language. The vulnerability exists in versions 3.3.3 through 3.4.1 of the REXML gem. It arises when the parser processes XML documents containing multiple XML declarations, which can lead to excessive resource consumption, potentially exhausting system resources such as CPU and memory. This uncontrolled resource consumption can cause the application or service using REXML to become unresponsive or crash, leading to a denial of service. The vulnerability does not require user interaction, authentication, or network access beyond local invocation, as indicated by the CVSS vector (AV:L). The issue was addressed in version 3.4.2 of the REXML gem, which includes patches to mitigate this vulnerability. No known exploits are currently reported in the wild. Given the low CVSS score of 1.2, the impact is limited primarily to availability under specific conditions where untrusted XML input with multiple declarations is parsed by vulnerable versions of REXML.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential disruption of services that rely on Ruby applications using the affected REXML versions to parse XML data, especially if these applications process untrusted or externally sourced XML inputs. This could affect web applications, APIs, or backend services that handle XML configurations or data interchange formats. While the vulnerability does not compromise confidentiality or integrity, the denial-of-service condition could lead to temporary service outages, affecting business continuity and user experience. Organizations in sectors with high reliance on Ruby-based infrastructure, such as fintech, e-commerce, and software development companies, may face operational risks. The low severity and lack of known exploits reduce the immediate threat level, but unpatched systems remain vulnerable to potential exploitation, especially in environments where XML input validation is insufficient.
Mitigation Recommendations
European organizations should take the following specific actions to mitigate this vulnerability: 1) Identify all Ruby applications and services using the REXML gem, particularly versions between 3.3.3 and 3.4.1. 2) Upgrade the REXML gem to version 3.4.2 or later, which contains the fix for this vulnerability. 3) Implement strict input validation and sanitization for XML data, especially when processing untrusted sources, to detect and reject XML documents with multiple XML declarations. 4) Employ runtime monitoring and resource usage limits on applications parsing XML to detect abnormal consumption patterns indicative of exploitation attempts. 5) For critical systems, consider using alternative XML parsing libraries with robust security features if upgrading REXML is not immediately feasible. 6) Incorporate this vulnerability into vulnerability management and patching workflows to ensure timely updates. 7) Conduct security testing and code reviews focusing on XML parsing logic to identify and remediate similar resource exhaustion risks.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Finland, Ireland
CVE-2025-58767: CWE-400: Uncontrolled Resource Consumption in ruby rexml
Description
REXML is an XML toolkit for Ruby. The REXML gems from 3.3.3 to 3.4.1 has a DoS vulnerability when parsing XML containing multiple XML declarations. If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities. The REXML gem 3.4.2 or later include the patches to fix these vulnerabilities.
AI-Powered Analysis
Technical Analysis
CVE-2025-58767 is a denial-of-service (DoS) vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting the REXML gem, an XML parsing toolkit for the Ruby programming language. The vulnerability exists in versions 3.3.3 through 3.4.1 of the REXML gem. It arises when the parser processes XML documents containing multiple XML declarations, which can lead to excessive resource consumption, potentially exhausting system resources such as CPU and memory. This uncontrolled resource consumption can cause the application or service using REXML to become unresponsive or crash, leading to a denial of service. The vulnerability does not require user interaction, authentication, or network access beyond local invocation, as indicated by the CVSS vector (AV:L). The issue was addressed in version 3.4.2 of the REXML gem, which includes patches to mitigate this vulnerability. No known exploits are currently reported in the wild. Given the low CVSS score of 1.2, the impact is limited primarily to availability under specific conditions where untrusted XML input with multiple declarations is parsed by vulnerable versions of REXML.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential disruption of services that rely on Ruby applications using the affected REXML versions to parse XML data, especially if these applications process untrusted or externally sourced XML inputs. This could affect web applications, APIs, or backend services that handle XML configurations or data interchange formats. While the vulnerability does not compromise confidentiality or integrity, the denial-of-service condition could lead to temporary service outages, affecting business continuity and user experience. Organizations in sectors with high reliance on Ruby-based infrastructure, such as fintech, e-commerce, and software development companies, may face operational risks. The low severity and lack of known exploits reduce the immediate threat level, but unpatched systems remain vulnerable to potential exploitation, especially in environments where XML input validation is insufficient.
Mitigation Recommendations
European organizations should take the following specific actions to mitigate this vulnerability: 1) Identify all Ruby applications and services using the REXML gem, particularly versions between 3.3.3 and 3.4.1. 2) Upgrade the REXML gem to version 3.4.2 or later, which contains the fix for this vulnerability. 3) Implement strict input validation and sanitization for XML data, especially when processing untrusted sources, to detect and reject XML documents with multiple XML declarations. 4) Employ runtime monitoring and resource usage limits on applications parsing XML to detect abnormal consumption patterns indicative of exploitation attempts. 5) For critical systems, consider using alternative XML parsing libraries with robust security features if upgrading REXML is not immediately feasible. 6) Incorporate this vulnerability into vulnerability management and patching workflows to ensure timely updates. 7) Conduct security testing and code reviews focusing on XML parsing logic to identify and remediate similar resource exhaustion risks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-04T19:18:09.500Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68caf4a946aca7f3592e4643
Added to database: 9/17/2025, 5:49:29 PM
Last enriched: 9/17/2025, 5:49:54 PM
Last updated: 9/17/2025, 6:01:59 PM
Views: 2
Related Threats
CVE-2025-10604: SQL Injection in PHPGurukul Online Discussion Forum
MediumCVE-2025-59352: CWE-202: Exposure of Sensitive Information Through Data Queries in dragonflyoss dragonfly
MediumCVE-2025-59349: CWE-732: Incorrect Permission Assignment for Critical Resource in dragonflyoss dragonfly
LowCVE-2025-59345: CWE-306: Missing Authentication for Critical Function in dragonflyoss dragonfly
LowCVE-2025-59348: CWE-457: Use of Uninitialized Variable in dragonflyoss dragonfly
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.