CVE-2025-8732
Wolfi vulnerability analysis and mitigation

Overview

A vulnerability (CVE-2025-8732) was discovered in libxml2 versions up to 2.14.5, affecting the xmlParseSGMLCatalog function within the xmlcatalog component. The vulnerability was initially disclosed on August 8, 2025, and involves uncontrolled recursion when processing SGML catalogs (Ubuntu CVE, Snyk Report).

Technical details

The vulnerability is classified with a CVSS v3.1 Base Score of 3.3 (Low), with the following vector string: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L. The issue specifically affects the xmlParseSGMLCatalog function, where improper handling of recursion can lead to resource consumption issues. The vulnerability requires local access to exploit and has been categorized under CWE-404 (Improper Resource Shutdown or Release) and CWE-674 (Uncontrolled Recursion) (Snyk Report).

Impact

The vulnerability primarily affects system availability, with potential for reduced performance or interruptions in resource availability. While repeated exploitation is possible, it does not allow complete denial of service to legitimate users. The impact is limited to local attacks with no loss of confidentiality or integrity (Snyk Report).

Mitigation and workarounds

Currently, there is no fixed version available for the affected libxml2 package. The vulnerability is under evaluation for various Ubuntu releases including 25.04, 24.04 LTS, 22.04 LTS, 20.04 LTS, 18.04 LTS, 16.04 LTS, and 14.04 LTS (Ubuntu CVE).

Community reactions

The vulnerability has gained attention in the cybersecurity community, particularly after being weaponized in Operation HollowQuill, where it was exploited as part of a sophisticated cyber espionage campaign targeting academic institutions and government agencies (Cybersecurity News).

Additional resources


SourceThis report was generated using AI

Related Wolfi vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66034CRITICAL9.8
  • PythonPython
  • mlflow
NoYesNov 29, 2025
CVE-2025-66031HIGH8.7
  • JavaScriptJavaScript
  • kibana-8.18
NoYesNov 26, 2025
CVE-2025-10543MEDIUM6.3
  • MinIOMinIO
  • agentbeat
NoYesDec 02, 2025
CVE-2025-66221MEDIUM6.3
  • PythonPython
  • localstack
NoYesNov 29, 2025
CVE-2025-3261MEDIUM6.2
  • JavaJava
  • thingsboard
NoYesNov 27, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management