Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66382: CWE-407 Inefficient Algorithmic Complexity in libexpat project libexpat

0
Low
VulnerabilityCVE-2025-66382cvecve-2025-66382cwe-407
Published: Fri Nov 28 2025 (11/28/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: libexpat project
Product: libexpat

Description

In libexpat through 2.7.3, a crafted file with an approximate size of 2 MiB can lead to dozens of seconds of processing time.

AI-Powered Analysis

AILast updated: 11/28/2025, 06:18:42 UTC

Technical Analysis

CVE-2025-66382 identifies a vulnerability in the libexpat XML parsing library, versions through 2.7.3, caused by inefficient algorithmic complexity (CWE-407). The issue arises when libexpat processes a crafted XML file approximately 2 MiB in size, which triggers excessive computational effort, causing the parser to consume dozens of seconds processing the input. This behavior can lead to a denial-of-service (DoS) condition by exhausting CPU resources, potentially impacting availability of applications or services relying on libexpat for XML parsing. The vulnerability does not affect confidentiality or integrity, as it does not allow data leakage or unauthorized modification. The CVSS 3.1 score is 2.9 (low), reflecting the requirement for local access (AV:L), high attack complexity (AC:H), no privileges (PR:N), and no user interaction (UI:N). No known exploits exist in the wild, and no official patches have been released at the time of publication. The vulnerability is primarily a performance degradation issue rather than a direct security compromise. Libexpat is widely used in various open-source and commercial software for XML parsing, including embedded systems, network devices, and server applications. Attackers with local access could exploit this by supplying crafted XML files to trigger prolonged processing times, potentially disrupting service availability.

Potential Impact

For European organizations, the primary impact of CVE-2025-66382 is potential denial-of-service through resource exhaustion when processing maliciously crafted XML files. This can degrade performance or cause service interruptions in applications relying on libexpat, such as web servers, middleware, or embedded devices. Critical infrastructure sectors using XML-based communication or configuration may experience reduced availability, affecting operational continuity. Although the vulnerability requires local access and has high attack complexity, insider threats or compromised internal systems could exploit it. The lack of confidentiality or integrity impact limits data breach risks, but availability degradation can still disrupt business processes. Organizations with high XML processing workloads or automated XML ingestion pipelines are more susceptible. The absence of known exploits reduces immediate risk, but the vulnerability should be addressed proactively to maintain service reliability.

Mitigation Recommendations

To mitigate CVE-2025-66382, organizations should implement several specific measures beyond generic advice: 1) Monitor and restrict the size of XML inputs accepted by applications using libexpat to prevent processing of unusually large or suspicious files. 2) Employ input validation and XML schema validation to reject malformed or unexpected XML content before parsing. 3) Isolate XML parsing operations in sandboxed or resource-limited environments to contain potential resource exhaustion impacts. 4) Apply rate limiting on XML processing requests to reduce the risk of denial-of-service from repeated crafted inputs. 5) Stay informed on libexpat project updates and apply patches promptly once available. 6) Conduct code audits and testing to identify and remediate inefficient XML processing patterns in dependent software. 7) For critical systems, consider alternative XML parsers with better resilience to algorithmic complexity issues until libexpat patches are released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69293eaf842b163e001fac42

Added to database: 11/28/2025, 6:18:23 AM

Last enriched: 11/28/2025, 6:18:42 AM

Last updated: 11/28/2025, 7:44:48 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats