Vulnerability DatabaseGHSA-353f-x4gh-cqq8

GHSA-353f-x4gh-cqq8
Ruby vulnerability analysis and mitigation

Overview

Nokogiri v1.18.9 addresses multiple critical vulnerabilities in its vendored libxml2 library, identified as CVE-2025-6021, CVE-2025-6170, CVE-2025-49794, CVE-2025-49795, and CVE-2025-49796. The vulnerabilities were discovered and disclosed in July 2025, affecting all versions of Nokogiri below 1.18.9 when using CRuby (MRI) with vendored libxml2 (GitHub Advisory).

Technical details

The vulnerabilities include multiple severe issues in libxml2: a stack-based buffer overflow in xmlBuildQName function (CVE-2025-6021, CVSS 7.5 High), a buffer overflow in xmllint's interactive shell (CVE-2025-6170, CVSS 2.5 Low), a use-after-free vulnerability in XPath parsing (CVE-2025-49794, CVSS 9.1 Critical), a NULL pointer dereference in XPath processing (CVE-2025-49795, CVSS 7.5 High), and a memory corruption issue in processing sch:name elements (CVE-2025-49796, CVSS 9.1 Critical) (GitHub Advisory, Red Hat CVE).

Impact

The vulnerabilities can lead to various severe consequences including denial of service, memory corruption, and potential code execution in certain configurations. The most critical issues (CVE-2025-49794 and CVE-2025-49796) have a CVSS score of 9.1, indicating potential for high impact on system integrity and availability when exploited (GitHub Advisory).

Mitigation and workarounds

Users are strongly advised to upgrade to Nokogiri v1.18.9 or later to address these vulnerabilities. For users unable to upgrade, an alternative mitigation involves compiling and linking Nokogiri against patched external libxml2 libraries (GitHub Advisory).

Community reactions

The security community has actively responded to these vulnerabilities, with Red Hat issuing multiple security advisories and patches. The Nokogiri team has promptly addressed the issues by incorporating the fixes from upstream libxml2 patches (GitHub PR).

Additional resources


SourceThis report was generated using AI

Related Ruby vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22589HIGH7.5
  • RubyRuby
  • spree_core
NoYesJan 10, 2026
GHSA-96qw-h329-v5rgHIGH7.5
  • JavaScriptJavaScript
  • shakapacker
NoYesJan 08, 2026
CVE-2026-22588MEDIUM6.5
  • RubyRuby
  • spree_api
NoYesJan 08, 2026
GHSA-g9jg-w8vm-g96vMEDIUM4.6
  • JavaScriptJavaScript
  • trix
NoYesDec 31, 2025
CVE-2025-61594LOW2.7
  • RubyRuby
  • rubygem-bigdecimal-debuginfo
NoYesDec 30, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management