REXML is an XML toolkit for Ruby. The REXML gems from 3.3.3 to 3.4.1 has a DoS vulnerability when parsing XML containing multiple XML declarations. If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities. The REXML gem 3.4.2 or later include the patches to fix these vulnerabilities.
References
Link | Resource |
---|---|
https://github.com/ruby/rexml/commit/5859bdeac792687eaf93d8e8f0b7e3c1e2ed5c23 | Patch |
https://github.com/ruby/rexml/security/advisories/GHSA-c2f4-jgmc-q2r5 | Vendor Advisory |
Configurations
History
19 Sep 2025, 15:59
Type | Values Removed | Values Added |
---|---|---|
First Time |
Ruby-lang rexml
Ruby-lang |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
References | () https://github.com/ruby/rexml/commit/5859bdeac792687eaf93d8e8f0b7e3c1e2ed5c23 - Patch | |
References | () https://github.com/ruby/rexml/security/advisories/GHSA-c2f4-jgmc-q2r5 - Vendor Advisory | |
CPE | cpe:2.3:a:ruby-lang:rexml:*:*:*:*:*:ruby:*:* |
17 Sep 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-17 18:15
Updated : 2025-09-19 15:59
NVD link : CVE-2025-58767
Mitre link : CVE-2025-58767
CVE.ORG link : CVE-2025-58767
JSON object : View
Products Affected
ruby-lang
- rexml
CWE
CWE-400
Uncontrolled Resource Consumption