Skip to main content

CVE-2025-49794

CVE Details

Visit the official vulnerability details page for CVE-2025-49794 to learn more.

Initial Publication

06/13/2025

Last Update

09/02/2025

Third Party Dependency

libxml2

NIST CVE Summary

A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path="..."/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.

CVE Severity

9.1

Our Official Summary

A use-after-free vulnerability has been identified in libxml2 (xmlSchematronGetNode) that can be exploited via maliciously crafted XML documents, particularly involving <sch:name path="..."/> Schematron elements. This may result in application crashes or unpredictable behavior when processing untrusted XML.

This issue is of low risk as containers where this is reported are not accessible without privileged access. Impact of exploitation is also low since the attack surface is restricted to containers and they do not allow execution of arbitraty code.

Status

Ongoing

Affected Products & Versions

VersionPalette EnterprisePalette Enterprise AirgapVerteXVerteX Airgap
4.7.16⚠️ Impacted✅ No Impact⚠️ Impacted✅ No Impact
4.6.41⚠️ Impacted✅ No Impact⚠️ Impacted✅ No Impact

Revision History

DateRevision
06/17/2025Status changed from Open to Ongoing
06/17/2025Official summary added
06/17/2025Advisory assigned with CRITICAL severity