CVE-2025-58767

REXML is an XML toolkit for Ruby. The REXML gems from 3.3.3 to 3.4.1 has a DoS vulnerability when parsing XML containing multiple XML declarations. If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities. The REXML gem 3.4.2 or later include the patches to fix these vulnerabilities.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ruby-lang:rexml:*:*:*:*:*:ruby:*:*

History

19 Sep 2025, 15:59

Type Values Removed Values Added
First Time Ruby-lang rexml
Ruby-lang
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
References () https://github.com/ruby/rexml/commit/5859bdeac792687eaf93d8e8f0b7e3c1e2ed5c23 - () https://github.com/ruby/rexml/commit/5859bdeac792687eaf93d8e8f0b7e3c1e2ed5c23 - Patch
References () https://github.com/ruby/rexml/security/advisories/GHSA-c2f4-jgmc-q2r5 - () https://github.com/ruby/rexml/security/advisories/GHSA-c2f4-jgmc-q2r5 - Vendor Advisory
CPE cpe:2.3:a:ruby-lang:rexml:*:*:*:*:*:ruby:*:*

17 Sep 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-17 18:15

Updated : 2025-09-19 15:59


NVD link : CVE-2025-58767

Mitre link : CVE-2025-58767

CVE.ORG link : CVE-2025-58767


JSON object : View

Products Affected

ruby-lang

  • rexml
CWE
CWE-400

Uncontrolled Resource Consumption