Stack-Based Buffer Overflow in libxml2 Product by GNOME
CVE-2025-24928

7.8HIGH

Key Information:

Vendor

Xmlsoft

Status
Vendor
CVE Published:
18 February 2025

What is CVE-2025-24928?

The libxml2 library, utilized for XML parsing and validation, contains a stack-based buffer overflow vulnerability in the xmlSnprintfElements function located in valid.c. This flaw can be exploited when DTD validation occurs on untrusted documents or untrusted DTDs, potentially allowing an attacker to manipulate memory and execute arbitrary code. Users are advised to update to the latest version to mitigate this risk.

Affected Version(s)

libxml2 0 < 2.12.10

libxml2 2.13.0 < 2.13.6

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-24928 : Stack-Based Buffer Overflow in libxml2 Product by GNOME