Description
In libexpat before 2.8.1, the computational complexity of attribute name collision checks allows a denial of service via moderately sized crafted XML input.
Published: 2026-05-10
Score: 2.9 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

In libexpat versions prior to 2.8.1, the routine that checks for attribute name collisions grows in computational complexity with the number of attributes. When a malicious actor supplies a moderately sized XML document containing many attributes with colliding names, parsing can consume excessive CPU and memory resources, causing the application or service to become unresponsive. The vulnerability is a classic denial‑of‑service flaw, classified as CWE‑407: check on correctness. The CVSS score of 2.9 reflects a low‑to‑moderate risk to confidentiality, integrity, and availability for systems that parse XML with libexpat.

Affected Systems

The flaw affects the libexpat library from the libexpat project. All installations using libexpat versions earlier than 2.8.1 are susceptible. No additional vendor or product variations are listed in the CNA data.

Risk and Exploitability

The attack requires constructing a crafted XML input with a high number of colliding attribute names. The CVSS assessment indicates low severity, and the exploitation probability (EPSS) is not reported, suggesting limited evidence of widespread exploitation. The vulnerability is not included in CISA's known exploited vulnerabilities catalog. Attackers would most likely send the malicious XML over a network interface that the application accepts, making the vector external. An effective exploit would need to bypass any application‑level input filtering and reach the XML parsing routine of libexpat.

Generated by OpenCVE AI on May 10, 2026 at 07:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade libexpat to version 2.8.1 or later.
  • Reduce the maximum size of XML documents that the application processes.
  • Implement resource limits—such as maximum XML depth, attribute count, and overall document size—to mitigate potential denial‑of‑service conditions.

Generated by OpenCVE AI on May 10, 2026 at 07:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 10 May 2026 07:45:00 +0000

Type Values Removed Values Added
Title Denial of Service via Attribute Name Collision in libexpat

Sun, 10 May 2026 06:45:00 +0000

Type Values Removed Values Added
Description In libexpat before 2.8.1, the computational complexity of attribute name collision checks allows a denial of service via moderately sized crafted XML input.
First Time appeared Libexpat Project
Libexpat Project libexpat
Weaknesses CWE-407
CPEs cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*
Vendors & Products Libexpat Project
Libexpat Project libexpat
References
Metrics cvssV3_1

{'score': 2.9, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L'}


Subscriptions

Libexpat Project Libexpat
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-10T06:42:10.021Z

Reserved: 2026-05-10T06:36:15.697Z

Link: CVE-2026-45186

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-10T07:16:07.883

Modified: 2026-05-10T07:16:07.883

Link: CVE-2026-45186

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-10T08:00:07Z

Weaknesses