Vulnerability DatabaseGHSA-xc9x-jj77-9p9j

GHSA-xc9x-jj77-9p9j
Ruby vulnerability analysis and mitigation

Overview

A moderate severity vulnerability (GHSA-xc9x-jj77-9p9j) was identified in Nokogiri's packaged libxml2 library. The vulnerability affects Nokogiri versions >= 1.16.0 and < 1.16.2, as well as versions < 1.15.6. This issue specifically impacts the CRuby implementation of Nokogiri when using packaged libraries, while JRuby users are not affected. The vulnerability was discovered and disclosed in February 2024, with patches released in Nokogiri versions 1.15.6 and 1.16.2 (GitHub Advisory).

Technical details

The vulnerability (CVE-2024-25062) occurs in the xmlTextReader module, which underlies Nokogiri::XML::Reader. When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free condition. The issue has been assigned CWE-416 (Use After Free) and received a CVSS v3.1 base score of 7.5 (HIGH) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (NVD, Gnome GitLab).

Impact

The vulnerability affects applications using the XML Reader interface with both DTD validation and XInclude expansion enabled. When exploited, it can lead to a use-after-free condition in the xmlValidatePopElement function, potentially causing application crashes or other memory-related issues (GitHub Advisory).

Mitigation and workarounds

Users are advised to upgrade to Nokogiri version ~> 1.15.6 or >= 1.16.2. For those unable to upgrade, an alternative mitigation involves compiling and linking Nokogiri against patched external libxml2 libraries. Users who have overridden defaults at installation time to use system libraries should monitor their distribution's libxml2 release announcements (GitHub Advisory).

Community reactions

The community response led to backporting security fixes to the 1.15.x branch, as evidenced by user requests and maintainer responses. This decision was made to support users who were unable to upgrade to newer versions due to various constraints (Nokogiri Discussion).

Additional resources


SourceThis report was generated using AI

Related Ruby vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-68271CRITICAL10
  • RubyRuby
  • openc3
NoYesJan 13, 2026
GHSA-5qw5-wf2q-f538HIGH8.8
  • RubyRuby
  • activerecord-jdbc-adapter
NoYesJan 16, 2026
CVE-2026-22589HIGH7.5
  • RubyRuby
  • spree_core
NoYesJan 10, 2026
GHSA-mpwp-4h2m-765cMEDIUM6.6
  • RubyRuby
  • activejob
NoYesJan 16, 2026
CVE-2026-22588MEDIUM6.5
  • RubyRuby
  • spree_api
NoYesJan 08, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management