Skip to content

Commit f2af530

Browse files
committed
Add advisory for CVE-2025-58767 (DoS vulnerability in REXML)
1 parent c5a81fb commit f2af530

File tree

1 file changed

+26
-0
lines changed

1 file changed

+26
-0
lines changed

rubies/ruby/CVE-2025-58767.yml

Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
---
2+
engine: ruby
3+
cve: 2025-58767
4+
url: https://www.ruby-lang.org/en/news/2025/09/18/dos-rexml-cve-2025-58767/
5+
title: DoS vulnerability in REXML
6+
date: 2025-09-18
7+
description: |
8+
REXML has a DoS condition when parsing malformed XML file
9+
10+
REXML is an XML toolkit for Ruby. The REXML gems from 3.3.3 to 3.4.1 has a DoS vulnerability when parsing
11+
XML containing multiple XML declarations. If you need to parse untrusted XMLs, you may be impacted to these
12+
vulnerabilities.
13+
The REXML gem 3.4.2 or later include the patches to fix these vulnerabilities.
14+
15+
patched_versions:
16+
- ">= 3.2.10"
17+
- ">= 3.3.11"
18+
- ">= 3.4.8"
19+
related:
20+
url:
21+
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rexml/CVE-2025-58767.yml
22+
- https://www.cve.org/CVERecord?id=CVE-2025-58767
23+
- https://www.ruby-lang.org/en/news/2025/12/17/ruby-3-4-8-released/
24+
- https://bugs.ruby-lang.org/issues/21632
25+
notes: |
26+
Ruby 3.3 and 3.2 have PRs to backport the fix but new versions haven't been released yet.

0 commit comments

Comments
 (0)