
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A security vulnerability was identified in Nokogiri's packaged libxml2 library, leading to the release of version 1.18.3 which updates libxml2 to version 2.13.6. This update addresses two distinct vulnerabilities: CVE-2025-24928 and CVE-2024-56171. The issue affects Nokogiri versions below 1.18.3 and was published on February 18, 2025 (GitHub Advisory).
The vulnerability encompasses two distinct issues in libxml2: First, a stack-buffer overflow vulnerability (CVE-2025-24928) that occurs during DTD validation error reporting when processing input containing long QName prefixes (approximately 3KB in length). Second, a use-after-free vulnerability (CVE-2024-56171) that manifests during XML Schema validation, particularly when processing untrusted XML Schemas or when validating untrusted documents against trusted Schemas that utilize xsd:keyref with recursively defined types having additional identity constraints (GitHub Advisory).
The vulnerabilities can lead to two types of security issues: For CVE-2025-24928, attackers could potentially trigger a stack-buffer overflow by crafting XML documents with extremely long QName prefixes during DTD validation. For CVE-2024-56171, attackers could cause a use-after-free condition when processing specially crafted XML Schemas or documents, particularly those involving xsd:keyref with recursive type definitions (GitHub Advisory).
The recommended mitigation is to upgrade to Nokogiri version 1.18.3 or later, which includes the patched libxml2 version 2.13.6. This update addresses both CVE-2025-24928 and CVE-2024-56171 (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”