VYPR
High severity7.4NVD Advisory· Published Apr 14, 2025· Updated Apr 22, 2026

CVE-2025-32914

CVE-2025-32914

Description

A flaw was found in libsoup, where the soup_multipart_new_from_message() function is vulnerable to an out-of-bounds read. This flaw allows a malicious HTTP client to induce the libsoup server to read out of bounds.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

libsoup's soup_multipart_new_from_message() has an out-of-bounds read flaw allowing a malicious HTTP client to cause a crash or information disclosure.

Vulnerability

Overview A flaw in libsoup's soup_multipart_new_from_message() function leads to an out-of-bounds read vulnerability. This occurs when parsing specially crafted multipart HTTP messages, where improper bounds checking allows reading beyond allocated memory [1].

Exploitation

Prerequisites An unauthenticated attacker can trigger the vulnerability by sending a malicious HTTP client request to a libsoup server. No special network position is required beyond the ability to send HTTP messages. The attack is remotely exploitable without authentication [2].

Impact

Successful exploitation could cause the server to read out-of-bounds memory, potentially leading to a crash (denial of service) or leakage of sensitive information. The CVSS v3 base score is 7.4, indicating high severity [1][3].

Mitigation

Red Hat has released patches for affected versions of libsoup via RHSA-2025:7505, RHSA-2025:8126, RHSA-2025:8139, and RHSA-2025:8140. Users should update to the fixed package versions to remediate the flaw [1][2][3][4].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

46

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

16

News mentions

0

No linked articles in our index yet.