VYPR
High severity7.8NVD Advisory· Published Jul 10, 2025· Updated May 12, 2026

CVE-2025-7425

CVE-2025-7425

Description

A flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT functions, such as the key() process, result in tree fragments, this corruption prevents the proper cleanup of ID attributes. As a result, the system may access freed memory, causing crashes or enabling attackers to trigger heap corruption.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CVE-2025-7425 is a high-severity heap corruption vulnerability in libxslt, triggered by improper cleanup of ID attributes during XSLT tree fragment processing.

Vulnerability

Overview

CVE-2025-7425 is a heap corruption flaw in libxslt, the C library implementing XSLT transformations. The root cause is an improper modification of the attribute type (atype) flags during processing. When XSLT functions such as key() generate tree fragments, the corrupted flags prevent the correct cleanup of ID attributes. This leads to memory corruption and a use-after-free condition [1][2].

Exploitation

The vulnerability can be exploited by providing a crafted XSLT stylesheet or XML input that triggers the key() function or similar operations producing tree fragments. No authentication is required if the attacker can deliver the malicious payload to an application using libxslt. Successful exploitation requires the target application to process untrusted XSLT files, a common scenario in web browsers, document processors, or industrial automation systems that parse XSLT [3][4].

Impact

An attacker exploiting this vulnerability could cause a denial of service via application crash or potentially achieve arbitrary code execution through controlled heap corruption. The CVSS v3 base score of 7.8 (High) reflects the high impact on confidentiality, integrity, and availability [1].

Mitigation

Red Hat has released a security advisory (RHSA-2025:13312) addressing this flaw in Red Hat Enterprise Linux [4]. Siemens has also listed this CVE in advisories SSA-265688 and SSA-082556, affecting SIMATIC S7-1500 products, and SSA-032379 for the SIMATIC CN 4100 [1][2][3]. Users should apply available patches or updates from their vendors. No workarounds are mentioned in the public advisories.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

43

News mentions

2