
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
CVE-2024-8176 is a stack overflow vulnerability discovered in the libexpat library, reported in March 2025. The vulnerability exists due to the way libexpat handles recursive entity expansion in XML documents. When parsing an XML document with deeply nested entity references, libexpat can be forced to recurse indefinitely, exhausting the stack space and causing a crash (Ubuntu Security, MITRE CVE).
The vulnerability has three distinct variants or 'faces': general entities in character data, general entities in attribute values, and parameter entities. The issue can be triggered by supplying a specially crafted XML document designed to create a long chain of recursive entities, essentially functioning as a 'linear version of billion laughs' attack. The vulnerability has received a CVSS 3.1 Base Score of 7.5 (High) with a vector of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (Hartwork Blog).
The primary impact is denial of service (DoS), with the potential for exploitable memory corruption depending on the environment and library usage. The attack can be made more efficient when XML input is combined with compression, which can significantly reduce the minimum attack payload size (Hartwork Blog).
The vulnerability has been fixed in libexpat version 2.7.0. The fix involves resolving the use of recursion for all three variants of entity usage. Organizations are strongly advised to upgrade to this version. The fix was developed through a collaborative effort involving multiple companies including Siemens and Red Hat (Hartwork Blog).
The vulnerability was initially reported by Jann Horn of Google Project Zero in July 2022, and the fix was developed over approximately 10 months through collaboration between multiple organizations including Siemens, Linutronix, and Red Hat. The security community has emphasized the broader lesson about the dangers of recursion in C software, with the maintainer stating 'Please leave recursion to math and keep it out of (in particular C) software: it kills and will kill again' (Hartwork Blog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”