Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24515: CWE-476 NULL Pointer Dereference in libexpat project libexpat

0
Low
VulnerabilityCVE-2026-24515cvecve-2026-24515cwe-476
Published: Fri Jan 23 2026 (01/23/2026, 07:46:36 UTC)
Source: CVE Database V5
Vendor/Project: libexpat project
Product: libexpat

Description

CVE-2026-24515 is a low-severity vulnerability in libexpat versions before 2. 7. 4 involving a NULL pointer dereference due to improper handling of unknown encoding handler user data in the XML_ExternalEntityParserCreate function. This flaw can cause a denial of service by crashing applications that use the affected libexpat versions when parsing specially crafted XML input. The vulnerability requires local access with high attack complexity and no privileges or user interaction, limiting its exploitability. There are no known exploits in the wild, and the impact is limited to availability without affecting confidentiality or integrity. European organizations using older libexpat versions embedded in their software stacks could experience service disruptions if targeted. Mitigation involves upgrading to libexpat 2. 7. 4 or later where the issue is fixed.

AI-Powered Analysis

AILast updated: 01/30/2026, 10:16:50 UTC

Technical Analysis

CVE-2026-24515 is a vulnerability identified in the libexpat XML parsing library, specifically in versions prior to 2.7.4. The issue arises in the XML_ExternalEntityParserCreate function, which fails to properly copy user data associated with unknown encoding handlers. This improper handling leads to a NULL pointer dereference (CWE-476), which can cause the application using libexpat to crash when processing certain crafted XML inputs. The vulnerability does not allow for code execution or data leakage but results in a denial of service (DoS) condition by terminating the affected process unexpectedly. The CVSS v3.1 score is 2.9, reflecting low severity due to the requirement for local access, high attack complexity, and no privileges or user interaction needed. The flaw is primarily an availability concern, with no impact on confidentiality or integrity. No public exploits have been reported, and no patches were linked in the provided data, but the issue is fixed in libexpat version 2.7.4. The vulnerability affects software that embeds libexpat for XML parsing, which is common in many open-source and commercial applications. Attackers would need to supply malicious XML data to trigger the crash, which is feasible in environments where XML input is processed locally or from trusted sources. The flaw highlights the importance of robust error handling in XML parsers to prevent service disruptions.

Potential Impact

For European organizations, the primary impact of CVE-2026-24515 is potential denial of service due to application crashes when processing malformed XML data. This could disrupt services that rely on XML parsing, such as web servers, middleware, or enterprise applications embedding libexpat. Although the vulnerability does not compromise data confidentiality or integrity, availability interruptions can affect business continuity, especially in critical infrastructure or service providers. Organizations with legacy systems or embedded devices using outdated libexpat versions are more vulnerable. The low exploitability and lack of known exploits reduce immediate risk, but targeted attacks or accidental crashes could still cause operational issues. The impact is more pronounced in sectors with heavy XML usage, including finance, telecommunications, and government services. Proper patching and input validation can prevent exploitation and maintain service reliability.

Mitigation Recommendations

To mitigate CVE-2026-24515, organizations should: 1) Upgrade libexpat to version 2.7.4 or later where the vulnerability is resolved. 2) Audit software dependencies to identify and update applications embedding vulnerable libexpat versions. 3) Implement strict input validation and sanitization for XML data, especially from untrusted or external sources, to reduce the risk of triggering the NULL pointer dereference. 4) Employ runtime monitoring and crash detection mechanisms to quickly identify and respond to application failures related to XML parsing. 5) For embedded or legacy systems where upgrading is challenging, consider isolating XML processing components or applying compensating controls such as sandboxing. 6) Maintain an inventory of systems using libexpat to prioritize patching efforts. 7) Engage with vendors for timely updates if libexpat is bundled within third-party products.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-23T07:46:36.099Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697328604623b1157c1b2149

Added to database: 1/23/2026, 7:50:56 AM

Last enriched: 1/30/2026, 10:16:50 AM

Last updated: 2/7/2026, 10:02:27 AM

Views: 122

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats