CVE-2025-7424

7.5 HIGH

📋 TL;DR

A type confusion vulnerability in libxslt's psvi memory field allows attackers to crash applications or corrupt memory during XML transformations. This affects any software using vulnerable libxslt versions for XML processing. The most likely impact is denial of service, but memory corruption could potentially lead to more severe consequences.

💻 Affected Systems

Products:
  • libxslt
  • Applications using libxslt for XML transformations
Versions: libxslt versions before 1.1.39
Operating Systems: Linux, Unix-like systems, Any OS with vulnerable libxslt
Default Config Vulnerable: ⚠️ Yes
Notes: Any application processing untrusted XML/XSLT using libxslt is vulnerable

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Memory corruption leading to arbitrary code execution or complete system compromise

🟠

Likely Case

Application crash causing denial of service

🟢

If Mitigated

Limited impact with proper input validation and sandboxing

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires attacker to control XML/XSLT input to vulnerable application

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: libxslt 1.1.39 or later

Vendor Advisory: https://access.redhat.com/security/cve/CVE-2025-7424

Restart Required: Yes

Instructions:

1. Check current libxslt version
2. Update to libxslt 1.1.39+ via package manager
3. Restart affected services
4. Recompile applications if statically linked

🔧 Temporary Workarounds

Disable XSLT processing

all

Disable XML transformation features in applications

Configure applications to reject XSLT processing

Input validation

all

Validate and sanitize all XML/XSLT input

Implement strict XML schema validation

🧯 If You Can't Patch

  • Implement network segmentation to isolate vulnerable systems
  • Deploy WAF with XML/XSLT filtering rules

🔍 How to Verify

Check if Vulnerable:

Check libxslt version: xsltproc --version

Check Version:

xsltproc --version | head -1

Verify Fix Applied:

Verify version is 1.1.39 or higher: xsltproc --version | grep -q '1\.1\.3[9-9]\|1\.1\.[4-9]'

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with segmentation faults
  • Memory corruption errors in system logs
  • Unexpected process termination

Network Indicators:

  • Unusual XML/XSLT payloads to services
  • Repeated connection attempts with XML data

SIEM Query:

source="application.logs" AND ("segmentation fault" OR "memory corruption" OR "libxslt")

🔗 References

📤 Share & Export