numbers.c in libxslt before 1.1.43 has a use-after-free because, in nested XPath evaluations, an XPath context node can be modified but never restored. This is related to xsltNumberFormatGetValue, xsltEvalXPathPredicate, xsltEvalXPathStringNs, and xsltComputeSortResultInternal.
CVE-2025-24855
- CVSS v3
- 7.8
- EG Score
- —
- EPSS
- —
- KEV
- Not listed
Published
March 14, 2025
Last Modified
November 3, 2025
References (2)
- cve@mitrehttps://gitlab.gnome.org/GNOME/libxslt/-/issues/128
- af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2025/03/msg00015.html
Vendor Advisories for CVE-2025-24855(5)
These vendors published their own advisory mentioning this CVE — often with vendor-specific remediation steps + affected product lists not in NVD.
- patch-release-gitlab-18-5-2-releasedGitLab Security
GitLab Patch Release: 18.5.2, 18.4.4, 18.3.6
- RHSA-2025:7702Red Hat Product SecurityHigh
Red Hat Security Advisory: OpenShift Container Platform 4.14.52 bug fix and security update
- RHSA-2025:4677Red Hat Product SecurityHigh
Red Hat Security Advisory: OpenShift Container Platform 4.13.58 bug fix and security update
- RHSA-2025:4731Red Hat Product SecurityHigh
Red Hat Security Advisory: OpenShift Container Platform 4.16.40 bug fix and security update
- RHSA-2025:4422Red Hat Product SecurityHigh
Red Hat Security Advisory: OpenShift Container Platform 4.15.50 bug fix and security update
Frequently asked(4)
What is CVE-2025-24855?
When was CVE-2025-24855 disclosed?
What is the CVSS score of CVE-2025-24855?
How do I remediate CVE-2025-24855?
Dependency Blast Radius
See which npm, PyPI, Go, and Maven packages are affected by CVE-2025-24855
Is Your Infrastructure Affected by CVE-2025-24855?
EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.