Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7424: Access of Resource Using Incompatible Type ('Type Confusion') in GNOME libxslt

0
High
VulnerabilityCVE-2025-7424cvecve-2025-7424
Published: Thu Jul 10 2025 (07/10/2025, 14:05:41 UTC)
Source: CVE Database V5
Vendor/Project: GNOME
Product: libxslt

Description

A flaw was found in the libxslt library. The same memory field, psvi, is used for both stylesheet and input data, which can lead to type confusion during XML transformations. This vulnerability allows an attacker to crash the application or corrupt memory. In some cases, it may lead to denial of service or unexpected behavior.

AI-Powered Analysis

AILast updated: 01/21/2026, 19:15:02 UTC

Technical Analysis

CVE-2025-7424 identifies a type confusion vulnerability in the GNOME libxslt library, a widely used tool for transforming XML documents using XSLT stylesheets. The root cause stems from the reuse of the same memory field, psvi, for both stylesheet and input data, which leads to incompatible type access during XML transformations. This type confusion can cause the application to crash or corrupt memory, potentially leading to denial of service or unpredictable behavior. The vulnerability is exploitable remotely without requiring authentication or user interaction, as XML input can be crafted maliciously to trigger the flaw during processing. While no public exploits have been reported yet, the vulnerability's nature and the critical role of libxslt in many Linux-based and GNOME-related applications make it a significant risk. The CVSS 3.1 base score of 7.5 reflects a high severity, with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact is primarily on availability, as confidentiality and integrity are not directly affected. The vulnerability affects all versions of libxslt prior to the patch, which is not yet linked but expected from GNOME or Linux distributors. Organizations using libxslt in XML processing pipelines, web services, or desktop applications should monitor for updates and prepare to deploy patches promptly.

Potential Impact

For European organizations, the vulnerability poses a risk of denial of service in systems that rely on libxslt for XML transformations, which can disrupt critical business processes, web services, or internal applications. While it does not directly compromise confidentiality or integrity, the ability to crash applications or corrupt memory can lead to service outages and potential cascading failures in dependent systems. Industries with heavy reliance on XML processing, such as telecommunications, finance, and government services, may experience operational disruptions. The remote exploitability without authentication increases the attack surface, especially for internet-facing services that parse XML data. Additionally, memory corruption could be leveraged in future exploit chains for more severe attacks, although currently no such exploits are known. The impact is heightened in environments using GNOME or Linux distributions where libxslt is a core component, which are common in European public sector and enterprise IT infrastructures.

Mitigation Recommendations

1. Monitor GNOME and Linux distribution security advisories closely and apply patches for libxslt as soon as they are released. 2. Temporarily restrict or isolate services that perform XML transformations using libxslt from untrusted networks to reduce exposure. 3. Employ application-level input validation and sanitization to detect and block malformed or suspicious XML inputs before processing. 4. Use runtime memory protection features such as Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) to mitigate exploitation impact. 5. Consider deploying intrusion detection or prevention systems with signatures for anomalous XML payloads targeting libxslt. 6. For critical systems, implement redundancy and failover mechanisms to maintain availability in case of denial of service. 7. Conduct code audits and testing for XML processing components to identify and remediate similar memory handling issues proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-07-10T08:43:48.349Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686fcb28a83201eaaca80f54

Added to database: 7/10/2025, 2:16:08 PM

Last enriched: 1/21/2026, 7:15:02 PM

Last updated: 2/4/2026, 5:31:47 PM

Views: 269

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats