REXML is an XML toolkit for Ruby. The REXML gem before 3.2.6 has a denial of service vulnerability when it parses an XML that has many `<`s in an attribute value. Those who need to parse untrusted XMLs may be impacted to this vulnerability. The REXML gem 3.2.7 or later include the patch to fix this vulnerability. As a workaround, don't parse untrusted XMLs.
References
Configurations
History
19 Sep 2025, 15:38
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/ruby/rexml/commit/4325835f92f3f142ebd91a3fdba4e1f1ab7f1cfb - Patch | |
References | () https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh - Vendor Advisory | |
References | () https://www.ruby-lang.org/en/news/2024/05/16/dos-rexml-cve-2024-35176 - Vendor Advisory | |
References | () https://security.netapp.com/advisory/ntap-20250306-0001/ - Third Party Advisory | |
CPE | cpe:2.3:a:ruby-lang:rexml:*:*:*:*:*:ruby:*:* | |
First Time |
Ruby-lang rexml
Ruby-lang |
07 Mar 2025, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2024-05-16 16:15
Updated : 2025-09-19 15:38
NVD link : CVE-2024-35176
Mitre link : CVE-2024-35176
CVE.ORG link : CVE-2024-35176
JSON object : View
Products Affected
ruby-lang
- rexml