Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24515: CWE-476 NULL Pointer Dereference in libexpat project libexpat

0
Low
VulnerabilityCVE-2026-24515cvecve-2026-24515cwe-476
Published: Fri Jan 23 2026 (01/23/2026, 07:46:36 UTC)
Source: CVE Database V5
Vendor/Project: libexpat project
Product: libexpat

Description

In libexpat before 2.7.4, XML_ExternalEntityParserCreate does not copy unknown encoding handler user data.

AI-Powered Analysis

AILast updated: 01/23/2026, 08:05:17 UTC

Technical Analysis

CVE-2026-24515 is a vulnerability identified in the libexpat XML parsing library, specifically affecting versions prior to 2.7.4. The issue arises in the function XML_ExternalEntityParserCreate, which is responsible for creating parsers for external XML entities. The vulnerability is due to the function's failure to correctly copy user data associated with unknown encoding handlers, leading to a NULL pointer dereference (CWE-476). When an application using the vulnerable libexpat version processes XML input that triggers this condition, it may dereference a NULL pointer, causing the application to crash and resulting in a denial of service (DoS). The CVSS v3.1 base score is 2.9, reflecting low severity, with attack vector local (AV:L), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and impact limited to availability (A:L). This means exploitation requires local access and is difficult to perform, but no authentication or user interaction is needed. There are no known public exploits or active exploitation reported. The vulnerability affects software that relies on libexpat for XML parsing, which is widely used in various applications and systems. The patch for this vulnerability is included starting from libexpat version 2.7.4, which corrects the handling of unknown encoding handler user data to prevent the NULL pointer dereference. Organizations using older versions should upgrade promptly to avoid potential service disruptions.

Potential Impact

The primary impact of CVE-2026-24515 is a denial of service caused by application crashes due to NULL pointer dereference when parsing crafted XML input. For European organizations, this could disrupt services that rely on libexpat for XML processing, including web servers, middleware, and embedded systems. Although the attack requires local access and has high complexity, insider threats or compromised internal systems could exploit this vulnerability to cause outages. The impact on confidentiality and integrity is negligible, but availability degradation could affect critical business operations, especially in sectors like finance, telecommunications, and government services where XML processing is common. The lack of known exploits and the low CVSS score suggest limited immediate risk, but unpatched systems remain vulnerable to potential targeted attacks or accidental crashes. Organizations with legacy systems or custom software embedding older libexpat versions are at higher risk. Ensuring availability and reliability of XML-dependent services is crucial to avoid operational disruptions.

Mitigation Recommendations

To mitigate CVE-2026-24515, European organizations should: 1) Upgrade all libexpat instances to version 2.7.4 or later, where the vulnerability is fixed. 2) Conduct an inventory of software and systems using libexpat, including embedded devices and third-party applications, to identify vulnerable versions. 3) Implement strict input validation and sanitization for XML data, especially when handling external entities or unknown encodings. 4) Employ application-level monitoring to detect crashes or abnormal terminations related to XML parsing. 5) Restrict local access to systems running vulnerable libexpat versions to trusted personnel only, reducing the risk of local exploitation. 6) Review and harden XML parser configurations to disable or limit external entity processing where not required. 7) Collaborate with software vendors to ensure timely patching of embedded libexpat components. These targeted actions go beyond generic advice by focusing on the specific nature of the vulnerability and its exploitation requirements.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-23T07:46:36.099Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697328604623b1157c1b2149

Added to database: 1/23/2026, 7:50:56 AM

Last enriched: 1/23/2026, 8:05:17 AM

Last updated: 1/23/2026, 11:58:14 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats