A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path="..."/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.
References
Configurations
No configuration.
History
22 Nov 2025, 03:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
13 Nov 2025, 10:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
03 Nov 2025, 20:19
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2025-06-16 16:15
Updated : 2025-11-22 03:15
NVD link : CVE-2025-49794
Mitre link : CVE-2025-49794
CVE.ORG link : CVE-2025-49794
JSON object : View
Products Affected
No product.
CWE
CWE-825
Expired Pointer Dereference
