Description
A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.
Published: 2025-06-16
Score: 2.5 Low
EPSS: < 1% Very Low
KEV: No
Impact: Potential Remote Code Execution
Action: Patch ASAP
AI Analysis

Impact

The flaw exists in the interactive shell of the XML lint tool provided by libxml2, which parses XML files. An attacker who can supply an excessively long command causes the program to read beyond allocated memory. The result is a crash, with the description noting that in rare configurations lacking modern protections the overflow could lead to execution of harmful code. Though the immediate effect is denial of service, the underlying buffer overflow introduces a potential remote code execution vector.

Affected Systems

Red Hat Enterprise Linux 6 through 10, Red Hat Hardened Images, Red Hat JBoss Core Services, and Red Hat OpenShift Container Platform 4 rely on libxml2 and hence are affected. The vulnerability applies to all recent releases of these products, including hardened and containered images.

Risk and Exploitability

The CVSS score of 2.5 reflects a low overall severity, and the EPSS score of less than 1% indicates a very low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog, further suggesting it is not actively exploited by adversaries. Likely attack vectors are local users who can invoke the xmllint interactive shell. In environments where modern mitigations are disabled or minimal, an attacker could trigger a buffer overflow to run arbitrary code; otherwise the primary danger remains a crash that may impact availability.

Generated by OpenCVE AI on April 20, 2026 at 15:32 UTC.

Remediation

Vendor Workaround

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to a widespread installation base, or stability. It is strongly recommended to apply the upstream patch once available.


OpenCVE Recommended Actions

  • Apply the upstream libxml2 patch when it becomes available, such as the one included in Red Hat errata RHSA-2026:7519.
  • Limit or remove access to the xmllint interactive shell for untrusted users; where possible use non‑interactive modes only.
  • Stay current with Red Hat security updates and monitor for the release of the erratum that addresses this issue.

Generated by OpenCVE AI on April 20, 2026 at 15:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4251-1 libxml2 security update
EUVD EUVD EUVD-2025-18442 A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.
Ubuntu USN Ubuntu USN USN-7694-1 libxml2 vulnerabilities
History

Sun, 19 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
References

Tue, 14 Apr 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat hummingbird
CPEs cpe:/a:redhat:hummingbird:1
Vendors & Products Redhat hummingbird

Tue, 24 Mar 2026 04:30:00 +0000

Type Values Removed Values Added
References

Mon, 03 Nov 2025 20:30:00 +0000

Type Values Removed Values Added
References

Wed, 08 Oct 2025 17:00:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:rhivos:1
Vendors & Products Redhat rhivos

Wed, 01 Oct 2025 01:15:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhivos
CPEs cpe:/o:redhat:rhivos:1
Vendors & Products Redhat rhivos

Tue, 12 Aug 2025 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Redhat openshift Container Platform
Xmlsoft
Xmlsoft libxml2
CPEs cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
Vendors & Products Redhat openshift Container Platform
Xmlsoft
Xmlsoft libxml2

Mon, 16 Jun 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Jun 2025 15:45:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE. A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.
Title libxml2: Stack Buffer Overflow in xmllint Interactive Shell Command Handling Libxml2: stack buffer overflow in xmllint interactive shell command handling
First Time appeared Redhat
Redhat enterprise Linux
Redhat jboss Core Services
Redhat openshift
CPEs cpe:/a:redhat:jboss_core_services:1
cpe:/a:redhat:openshift:4
cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
Redhat jboss Core Services
Redhat openshift
References

Mon, 16 Jun 2025 15:15:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE.
Title libxml2: Stack Buffer Overflow in xmllint Interactive Shell Command Handling
Weaknesses CWE-121
References
Metrics threat_severity

None

cvssV3_1

{'score': 2.5, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L'}

threat_severity

Low


Subscriptions

Redhat Enterprise Linux Hummingbird Jboss Core Services Openshift Openshift Container Platform
Xmlsoft Libxml2
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-04-19T19:51:28.777Z

Reserved: 2025-06-16T05:59:31.739Z

Link: CVE-2025-6170

cve-icon Vulnrichment

Updated: 2025-11-03T20:06:50.396Z

cve-icon NVD

Status : Modified

Published: 2025-06-16T16:15:20.430

Modified: 2026-04-19T20:16:22.797

Link: CVE-2025-6170

cve-icon Redhat

Severity : Low

Publid Date: 2025-06-16T00:00:00Z

Links: CVE-2025-6170 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T15:45:10Z

Weaknesses