5.6 CVE-2025-32414

Patch Exploit
 

In libxml2 before 2.13.8 and 2.14.x before 2.14.2, out-of-bounds memory access can occur in the Python API (Python bindings) because of an incorrect return value. This occurs in xmlPythonFileRead and xmlPythonFileReadRaw because of a difference between bytes and characters.
https://nvd.nist.gov/vuln/detail/CVE-2025-32414

Categories

CWE-393 : Return of Wrong Status Code
This can lead to unpredictable behavior. If the function is used to make security-critical decisions or provide security-critical information, then the wrong status code can cause the product to assume that an action is safe or correct, even when it is not.

CWE-252 : Unchecked Return Value
Two common programmer assumptions are "this function call can never fail" and "it doesn't matter if this function call fails". If an attacker can force the function to fail or otherwise return a value that is not expected, then the subsequent program logic could lead to a vulnerability, because the product is not in a state that the programmer assumes. For example, if the program calls a function to drop privileges but does not check the return code to ensure that privileges were successfully dropped, then the program will continue to operate with the higher privileges.

References

134c704f-9b21-4f2e-91b3-4a467353bcc0 Patch Exploit

cve@mitre.org Patch Exploit


 

CPE

cpe start end
Configuration 1
cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:* < 2.13.8
cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:* >= 2.14.0 < 2.14.2


REMEDIATION


Patch

Url
https://gitlab.gnome.org/GNOME/libxml2/-/issues/889
https://gitlab.gnome.org/GNOME/libxml2/-/issues/889


EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
https://gitlab.gnome.org/GNOME/libxml2/-/issues/889
https://gitlab.gnome.org/GNOME/libxml2/-/issues/889


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
No entry