平台
linux
组件
libxslt
修复版本
1.1.43
CVE-2025-24855 is a use-after-free vulnerability discovered in the libxslt library, impacting Nokogiri versions 1.9.1 and earlier. This flaw, rated 7.8 (HIGH) on the CVSS scale, can potentially lead to remote code execution if exploited. The vulnerability is resolved by upgrading to Nokogiri version 1.18.4, which updates the underlying libxslt dependency.
The use-after-free vulnerability in libxslt, as exploited through Nokogiri, allows an attacker to potentially execute arbitrary code on a vulnerable system. This occurs due to improper handling of XPath context nodes, leading to memory corruption. Successful exploitation could allow an attacker to gain control of the application server, access sensitive data, or even compromise the entire system. The MITRE assessment highlights potential for high impact, including confidentiality and integrity compromises, and the ability to achieve remote code execution with no user interaction. This vulnerability shares similarities with other memory corruption exploits, where attackers can manipulate memory to achieve unauthorized access or control.
CVE-2025-24855 was publicly disclosed on March 14, 2025. It is associated with CVE-2024-55549, also addressed in the libxslt update. The vulnerability is tracked on the NVD (National Vulnerability Database). There is currently no indication of active exploitation campaigns targeting this specific vulnerability, but the high severity rating warrants immediate attention. The EPSS score is pending evaluation.
Ruby applications that rely on Nokogiri for XML parsing are at risk. This includes web applications, data processing pipelines, and any system using Nokogiri to handle XML data. Specifically, systems using older versions of Nokogiri, or those running in environments with limited patching capabilities, are particularly vulnerable.
• ruby / gem: gem list nokogiri to check installed version. If ≤1.9.1, the system is vulnerable. grep -r 'xsltEvalXPathStringNs' * within the Nokogiri gem directory to identify potential usage of the vulnerable function.
• generic web: Examine application logs for unusual XPath expressions or errors related to XML processing. Monitor network traffic for suspicious requests targeting XML endpoints.
• linux / server: Monitor system logs for crashes or errors related to libxslt. Use lsof to identify processes using libxslt and investigate their behavior.
disclosure
漏洞利用状态
EPSS
0.05% (15% 百分位)
CISA SSVC
CVSS 向量
The primary mitigation for CVE-2025-24855 is to upgrade Nokogiri to version 1.18.4 or later. If an immediate upgrade is not feasible due to compatibility issues, consider temporarily isolating vulnerable systems or implementing stricter network controls to limit potential attack vectors. While a direct workaround is not available, implementing Web Application Firewall (WAF) rules to filter potentially malicious XPath expressions could provide a temporary layer of defense. After upgrading, verify the fix by attempting to trigger the XPath evaluation that previously exposed the vulnerability and confirming that no errors or crashes occur.
Actualice la biblioteca libxslt a la versión 1.1.43 o superior. Esto solucionará la vulnerabilidad de use-after-free. Puede obtener la última versión desde el sitio web del proveedor o a través del administrador de paquetes de su sistema operativo.
漏洞分析和关键警报直接发送到您的邮箱。
CVE-2025-24855 is a HIGH severity use-after-free vulnerability affecting Nokogiri versions 1.9.1 and earlier, stemming from an outdated libxslt dependency. It can potentially lead to remote code execution.
Yes, if you are using Nokogiri version 1.9.1 or earlier, you are affected by this vulnerability. Check your installed version using gem list nokogiri.
Upgrade Nokogiri to version 1.18.4 or later using gem install nokogiri:1.18.4 or your preferred package manager.
There is currently no indication of active exploitation campaigns targeting this specific vulnerability, but the high severity rating warrants immediate attention.
Refer to the Nokogiri project's release notes and security advisories on their official website or GitHub repository for the latest information.