libxslt Heap Corruption via atype Flag Manipulation
CVE-2025-7425 Published on July 10, 2025

A flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT functions, such as the key() process, result in tree fragments, this corruption prevents the proper cleanup of ID attributes. As a result, the system may access freed memory, causing crashes or enabling attackers to trigger heap corruption.

Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory NVD

Vulnerability Analysis

CVE-2025-7425 can be exploited with local system access, and does not require authorization privileges or user interaction. This vulnerability is consided to have a high level of attack complexity. Public availability of a proof of concept (POC) exploit exists for CVE-2025-7425. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality, a high impact on integrity and availability.

Attack Vector:
LOCAL
Attack Complexity:
HIGH
Privileges Required:
NONE
User Interaction:
NONE
Scope:
CHANGED
Confidentiality Impact:
NONE
Integrity Impact:
HIGH
Availability Impact:
HIGH

Weakness Type

What is a Dangling pointer Vulnerability?

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

CVE-2025-7425 has been classified to as a Dangling pointer vulnerability or weakness.


Products Associated with CVE-2025-7425

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2025-7425 are published in these products:

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Affected Versions

GNOME libxml2: Red Hat Enterprise Linux 7 Extended Lifecycle Support: Red Hat Enterprise Linux 8: Red Hat Enterprise Linux 8: Red Hat Enterprise Linux 8.2 Advanced Update Support: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support: Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On: Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support: Red Hat Enterprise Linux 8.6 Telecommunications Update Service: Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions: Red Hat Enterprise Linux 8.8 Telecommunications Update Service: Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions: Red Hat Enterprise Linux 9: Red Hat Enterprise Linux 9: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions: Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions: Red Hat Enterprise Linux 9.4 Extended Update Support: Red Hat OpenShift Container Platform 4.12: Red Hat OpenShift Container Platform 4.13: Red Hat OpenShift Container Platform 4.14: Red Hat OpenShift Container Platform 4.15: Red Hat OpenShift Container Platform 4.16: Red Hat OpenShift Container Platform 4.17: Red Hat OpenShift Container Platform 4.18: Red Hat OpenShift Container Platform 4.19: Red Hat Web Terminal 1.11 on RHEL 9: Red Hat Web Terminal 1.11 on RHEL 9: Red Hat Web Terminal 1.12 on RHEL 9: Red Hat RHOSS-1.36-RHEL-8: Red Hat RHOSS-1.36-RHEL-8: Red Hat RHOSS-1.36-RHEL-8: Red Hat RHOSS-1.36-RHEL-8: Red Hat RHOSS-1.36-RHEL-8: Red Hat RHOSS-1.36-RHEL-8: Red Hat RHOSS-1.36-RHEL-8: Red Hat RHOSS-1.36-RHEL-8: Red Hat RHOSS-1.36-RHEL-8: Red Hat RHOSS-1.36-RHEL-8: Red Hat RHOSS-1.36-RHEL-8: cert-manager operator for Red Hat OpenShift 1.16: Red Hat Compliance Operator 1: Red Hat Compliance Operator 1: Red Hat Compliance Operator 1: Red Hat File Integrity Operator 1: Red Hat Discovery 2: Red Hat Insights proxy 1.5: Red Hat OpenShift distributed tracing 3.5.1: Red Hat OpenShift distributed tracing 3.5.1: Red Hat OpenShift distributed tracing 3.5.1: Red Hat OpenShift distributed tracing 3.5.1: Red Hat OpenShift distributed tracing 3.5.1: Red Hat OpenShift distributed tracing 3.5.1: Red Hat OpenShift distributed tracing 3.5.1: Red Hat OpenShift distributed tracing 3.5.1: Red Hat OpenShift distributed tracing 3.5.1: Red Hat Enterprise Linux 10: Red Hat Enterprise Linux 6:

Exploit Probability

EPSS
0.04%
Percentile
9.72%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.