CVE-2025-7425
Description
A flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT functions, such as the key() process, result in tree fragments, this corruption prevents the proper cleanup of ID attributes. As a result, the system may access freed memory, causing crashes or enabling attackers to trigger heap corruption.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2025-7425 is a high-severity heap corruption vulnerability in libxslt, triggered by improper cleanup of ID attributes during XSLT tree fragment processing.
Vulnerability
Overview
CVE-2025-7425 is a heap corruption flaw in libxslt, the C library implementing XSLT transformations. The root cause is an improper modification of the attribute type (atype) flags during processing. When XSLT functions such as key() generate tree fragments, the corrupted flags prevent the correct cleanup of ID attributes. This leads to memory corruption and a use-after-free condition [1][2].
Exploitation
The vulnerability can be exploited by providing a crafted XSLT stylesheet or XML input that triggers the key() function or similar operations producing tree fragments. No authentication is required if the attacker can deliver the malicious payload to an application using libxslt. Successful exploitation requires the target application to process untrusted XSLT files, a common scenario in web browsers, document processors, or industrial automation systems that parse XSLT [3][4].
Impact
An attacker exploiting this vulnerability could cause a denial of service via application crash or potentially achieve arbitrary code execution through controlled heap corruption. The CVSS v3 base score of 7.8 (High) reflects the high impact on confidentiality, integrity, and availability [1].
Mitigation
Red Hat has released a security advisory (RHSA-2025:13312) addressing this flaw in Red Hat Enterprise Linux [4]. Siemens has also listed this CVE in advisories SSA-265688 and SSA-082556, affecting SIMATIC S7-1500 products, and SSA-032379 for the SIMATIC CN 4100 [1][2][3]. Users should apply available patches or updates from their vendors. No workarounds are mentioned in the public advisories.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
43- seclists.org/fulldisclosure/2025/Aug/0nvd
- seclists.org/fulldisclosure/2025/Jul/30nvd
- seclists.org/fulldisclosure/2025/Jul/32nvd
- seclists.org/fulldisclosure/2025/Jul/35nvd
- seclists.org/fulldisclosure/2025/Jul/37nvd
- www.openwall.com/lists/oss-security/2025/07/11/2nvd
- access.redhat.com/errata/RHBA-2025:12345nvd
- access.redhat.com/errata/RHSA-2025:12447nvd
- access.redhat.com/errata/RHSA-2025:12450nvd
- access.redhat.com/errata/RHSA-2025:13267nvd
- access.redhat.com/errata/RHSA-2025:13308nvd
- access.redhat.com/errata/RHSA-2025:13309nvd
- access.redhat.com/errata/RHSA-2025:13310nvd
- access.redhat.com/errata/RHSA-2025:13311nvd
- access.redhat.com/errata/RHSA-2025:13312nvd
- access.redhat.com/errata/RHSA-2025:13313nvd
- access.redhat.com/errata/RHSA-2025:13314nvd
- access.redhat.com/errata/RHSA-2025:13335nvd
- access.redhat.com/errata/RHSA-2025:13464nvd
- access.redhat.com/errata/RHSA-2025:13622nvd
- access.redhat.com/errata/RHSA-2025:14059nvd
- access.redhat.com/errata/RHSA-2025:14396nvd
- access.redhat.com/errata/RHSA-2025:14818nvd
- access.redhat.com/errata/RHSA-2025:14819nvd
- access.redhat.com/errata/RHSA-2025:14853nvd
- access.redhat.com/errata/RHSA-2025:14858nvd
- access.redhat.com/errata/RHSA-2025:15308nvd
- access.redhat.com/errata/RHSA-2025:15672nvd
- access.redhat.com/errata/RHSA-2025:15827nvd
- access.redhat.com/errata/RHSA-2025:15828nvd
- access.redhat.com/errata/RHSA-2025:18219nvd
- access.redhat.com/errata/RHSA-2025:21885nvd
- access.redhat.com/errata/RHSA-2025:21913nvd
- access.redhat.com/errata/RHSA-2026:0934nvd
- access.redhat.com/errata/RHSA-2026:11503nvd
- access.redhat.com/security/cve/CVE-2025-7425nvd
- bugzilla.redhat.com/show_bug.cginvd
- cert-portal.siemens.com/productcert/html/ssa-032379.htmlnvd
- cert-portal.siemens.com/productcert/html/ssa-082556.htmlnvd
- cert-portal.siemens.com/productcert/html/ssa-265688.htmlnvd
- cert-portal.siemens.com/productcert/html/ssa-577017.htmlnvd
- gitlab.gnome.org/GNOME/libxslt/-/issues/140nvd
- lists.debian.org/debian-lts-announce/2025/09/msg00035.htmlnvd
News mentions
2- Siemens Ruggedcom RoxCISA ICS Advisories
- Siemens SIMATICCISA ICS Advisories