vulnerability
Ubuntu: USN-7694-1 (CVE-2025-49794): libxml2 vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:L/Au:N/C:N/I:C/A:C) | Jun 16, 2025 | Aug 21, 2025 | Apr 16, 2026 |
Severity
9
CVSS
(AV:N/AC:L/Au:N/C:N/I:C/A:C)
Published
Jun 16, 2025
Added
Aug 21, 2025
Modified
Apr 16, 2026
Description
A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path="..."/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.
Solutions
ubuntu-pro-upgrade-libxml2ubuntu-pro-upgrade-python-libxml2ubuntu-pro-upgrade-python3-libxml2ubuntu-upgrade-libxml2ubuntu-upgrade-python3-libxml2
References
- CVE-2025-49794
- https://attackerkb.com/topics/CVE-2025-49794
- CWE-825
- EUVD-EUVD-2025-18412
- UBUNTU-USN-7694-1
- https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-18412
- https://gitlab.gnome.org/GNOME/libxml2/-/issues/931
- https://ubuntu.com/security/notices/USN-7694-1
- https://www.cve.org/CVERecord?id=CVE-2025-49794
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.