vulnerability
Amazon Linux 2023: CVE-2025-22872: Medium priority package update for ecs-init (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:M/Au:N/C:P/I:P/A:P) | Apr 16, 2025 | Jun 3, 2025 | Sep 30, 2025 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
Apr 16, 2025
Added
Jun 3, 2025
Modified
Sep 30, 2025
Description
The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. <math>, <svg>, etc contexts).
A flaw was found in the HTML tokenizer component. This vulnerability allows incorrect DOM construction and potential content misplacement via unquoted attribute values ending with a (/) in tags within foreign content contexts such as <math> or <svg>.
A flaw was found in the HTML tokenizer component. This vulnerability allows incorrect DOM construction and potential content misplacement via unquoted attribute values ending with a (/) in tags within foreign content contexts such as <math> or <svg>.
Solutions
amazon-linux-2023-upgrade-amazon-cloudwatch-agentamazon-linux-2023-upgrade-amazon-ssm-agentamazon-linux-2023-upgrade-ecs-initamazon-linux-2023-upgrade-nerdctlamazon-linux-2023-upgrade-runfinch-finchamazon-linux-2023-upgrade-soci-snapshotter
References
- CVE-2025-22872
- https://attackerkb.com/topics/CVE-2025-22872
- URL-https://alas.aws.amazon.com/AL2023/ALAS-2025-1011.html
- URL-https://alas.aws.amazon.com/AL2023/ALAS-2025-1029.html
- URL-https://alas.aws.amazon.com/AL2023/ALAS-2025-1202.html
- URL-https://alas.aws.amazon.com/AL2023/ALAS-2025-979.html
- URL-https://alas.aws.amazon.com/AL2023/ALAS-2025-980.html
- URL-https://alas.aws.amazon.com/AL2023/ALAS-2025-981.html
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.