Vulnerability DatabaseGHSA-fq42-c5rg-92c2

GHSA-fq42-c5rg-92c2
Ruby vulnerability analysis and mitigation

Overview

Nokogiri v1.13.2 addresses security vulnerabilities in two of its packaged dependencies: libxml2 (upgraded from v2.9.12 to v2.9.13) and libxslt (upgraded from v1.1.34 to v1.1.35). The vulnerability affects the CRuby implementation of Nokogiri versions below 1.13.2, specifically when using packaged libraries. This security update addresses two significant CVEs: CVE-2021-30560 in libxslt (CVSS 8.8, High severity) and CVE-2022-23308 in libxml2 (Unspecified severity). The vulnerability was published on February 21, 2022, and last updated on January 11, 2023 (GitHub Advisory).

Technical details

The vulnerability encompasses two distinct issues in dependent libraries. The libxslt vulnerability (CVE-2021-30560) affects all versions prior to v1.1.35 and is rated with a CVSS3 score of 8.8 (High). The libxml2 vulnerability (CVE-2022-23308) involves parsing untrusted documents with specific parse options: DTDVALID set to true and NOENT set to false. While NOENT is disabled by default for most parsing operations, it is enabled by default for XSLT stylesheet parsing in Nokogiri v1.12.0 and later. The DTDVALID option is not set by default for any operations in Nokogiri (GitHub Advisory).

Impact

The vulnerabilities can lead to multiple security implications. For libxslt (CVE-2021-30560), applications using untrusted XSL stylesheets to transform XML are vulnerable to denial-of-service attacks. For libxml2 (CVE-2022-23308), applications may be vulnerable to denial of service, memory disclosure, or code execution when parsing untrusted documents with specific parse options. The impact is particularly significant for applications explicitly setting the DTDVALID parse option when handling untrusted documents (GitHub Advisory).

Mitigation and workarounds

The primary mitigation is to upgrade to Nokogiri version 1.13.2 or higher. For users unable to upgrade, an alternative mitigation involves compiling and linking an older version of Nokogiri against external libraries libxml2 >= 2.9.13 and libxslt >= 1.1.35. Users who have overridden defaults at installation time to use system libraries should monitor their distribution's libxml2 and libxslt release announcements for security updates (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Ruby vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66568CRITICAL9.3
  • RubyRuby
  • ruby-saml
NoYesDec 09, 2025
CVE-2025-66567CRITICAL9.3
  • RubyRuby
  • ruby-saml
NoYesDec 09, 2025
GHSA-4249-gjr8-jpq3HIGH8.7
  • RubyRuby
  • prosemirror_to_html
NoYesNov 13, 2025
CVE-2025-64501HIGH7.6
  • RubyRuby
  • prosemirror_to_html
NoYesNov 10, 2025
GHSA-vfpf-xmwh-8m65HIGH7.6
  • RubyRuby
  • prosemirror_to_html
NoYesNov 07, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management