Skip to content

Commit 413001a

Browse files
authored
Add advisory for CVE-2025-58767 (DoS vulnerability in REXML) (#937)
1 parent 9e8d649 commit 413001a

File tree

2 files changed

+25
-0
lines changed

2 files changed

+25
-0
lines changed

CONTRIBUTORS.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,5 +39,6 @@ This database would not be possible without volunteers willing to submit pull re
3939
* [Florian Wininger](https://github.com/fwininger)
4040
* [Al Snow](https://github.com/jasnow)
4141
* [Adrian Hirt](https://github.com/Adrian-Hirt)
42+
* [Huda Kharrufa](https://github.com/hudakh)
4243

4344
The rubysec.com domain was graciously donated by [Jordi Massaguer](https://github.com/jordimassaguerpla).

rubies/ruby/CVE-2025-58767.yml

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
---
2+
engine: ruby
3+
cve: 2025-58767
4+
url: https://www.ruby-lang.org/en/news/2025/09/18/dos-rexml-cve-2025-58767/
5+
title: DoS vulnerability in REXML
6+
date: 2025-09-18
7+
description: |
8+
REXML has a DoS condition when parsing malformed XML file
9+
10+
REXML is an XML toolkit for Ruby. The REXML gems from 3.3.3 to 3.4.1 has a DoS vulnerability when parsing
11+
XML containing multiple XML declarations. If you need to parse untrusted XMLs, you may be impacted to these
12+
vulnerabilities.
13+
The REXML gem 3.4.2 or later include the patches to fix these vulnerabilities.
14+
15+
patched_versions:
16+
- ">= 3.4.8"
17+
related:
18+
url:
19+
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rexml/CVE-2025-58767.yml
20+
- https://www.cve.org/CVERecord?id=CVE-2025-58767
21+
- https://www.ruby-lang.org/en/news/2025/12/17/ruby-3-4-8-released/
22+
- https://bugs.ruby-lang.org/issues/21632
23+
notes: |
24+
Ruby 3.3 and 3.2 have PRs to backport the fix but new versions haven't been released yet.

0 commit comments

Comments
 (0)