5.6 CVE-2025-32414
Patch Exploit
In libxml2 before 2.13.8 and 2.14.x before 2.14.2, out-of-bounds memory access can occur in the Python API (Python bindings) because of an incorrect return value. This occurs in xmlPythonFileRead and xmlPythonFileReadRaw because of a difference between bytes and characters.
https://nvd.nist.gov/vuln/detail/CVE-2025-32414
Categories
CWE-393 : Return of Wrong Status Code
This can lead to unpredictable behavior. If the function is used to make security-critical decisions or provide security-critical information, then the wrong status code can cause the product to assume that an action is safe or correct, even when it is not.
CWE-252 : Unchecked Return Value
Two common programmer assumptions are "this function call can never fail" and "it doesn't matter if this function call fails". If an attacker can force the function to fail or otherwise return a value that is not expected, then the subsequent program logic could lead to a vulnerability, because the product is not in a state that the programmer assumes. For example, if the program calls a function to drop privileges but does not check the return code to ensure that privileges were successfully dropped, then the program will continue to operate with the higher privileges.
References
134c704f-9b21-4f2e-91b3-4a467353bcc0 Patch Exploit
https://gitlab.gnome.org/GNOME/libxml2/-/issues/889 Exploit Issue Tracking Patch |
cve@mitre.org Patch Exploit
https://gitlab.gnome.org/GNOME/libxml2/-/issues/889 Exploit Issue Tracking Patch |
CPE
cpe | start | end |
---|---|---|
Configuration 1 | ||
cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:* | < 2.13.8 | |
cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:* | >= 2.14.0 | < 2.14.2 |
REMEDIATION
Patch
Url |
---|
https://gitlab.gnome.org/GNOME/libxml2/-/issues/889 |
https://gitlab.gnome.org/GNOME/libxml2/-/issues/889 |
EXPLOITS
Exploit-db.com
id | description | date | |
---|---|---|---|
No known exploits |
POC Github
Url |
---|
No known exploits |
Other Nist (github, ...)
Url |
---|
https://gitlab.gnome.org/GNOME/libxml2/-/issues/889 |
https://gitlab.gnome.org/GNOME/libxml2/-/issues/889 |
CAPEC
Common Attack Pattern Enumerations and Classifications
id | description | severity |
---|---|---|
No entry |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.