CVE Vulnerabilities

CVE-2025-9714

Uncontrolled Recursion

Published: Sep 10, 2025 | Modified: Nov 03, 2025
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
6.2 MODERATE
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Uncontrolled recursion in XPath evaluation in libxml2 up to and including version 2.9.14 allows a local attacker to cause a stack overflow via crafted expressions. XPath processing functions xmlXPathRunEval, xmlXPathCtxtCompile, and xmlXPathEvalExpr were resetting recursion depth to zero before making potentially recursive calls. When such functions were called recursively this could allow for uncontrolled recursion and lead to a stack overflow. These functions now preserve recursion depth across recursive calls, allowing recursion depth to be controlled.

Weakness

The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.

Affected Software

NameVendorStart VersionEnd Version
Libxml2Xmlsoft*2.10.0 (excluding)
Red Hat Enterprise Linux 9RedHatlibxml2-0:2.9.13-14.el9_7*
Red Hat Enterprise Linux 9RedHatlibxml2-0:2.9.13-14.el9_7*
Red Hat Enterprise Linux 9.0 Update Services for SAP SolutionsRedHatlibxml2-0:2.9.13-1.el9_0.8*
Red Hat Enterprise Linux 9.2 Update Services for SAP SolutionsRedHatlibxml2-0:2.9.13-3.el9_2.10*
Red Hat Enterprise Linux 9.4 Extended Update SupportRedHatlibxml2-0:2.9.13-13.el9_4*
Red Hat Enterprise Linux 9.6 Extended Update SupportRedHatlibxml2-0:2.9.13-12.el9_6.1*
Red Hat OpenShift Container Platform 4.13RedHatrhcos-413.92.202601130113-0*
Red Hat OpenShift Container Platform 4.14RedHatrhcos-414.92.202601191325-0*
Red Hat OpenShift Container Platform 4.16RedHatrhcos-416.94.202601160124-0*
Red Hat OpenShift Container Platform 4.17RedHatrhcos-417.94.202601120213-0*
Red Hat OpenShift Container Platform 4.20RedHatrhcos-4.20.9.6.202601211057-0*
Red Hat AI Inference Server 3.2RedHatrhaiis/model-opt-cuda-rhel9:sha256:f083e52ef4198ab8123c49eb044c4374ec996f65633d224bb8152ef0c3f30e7d*
Red Hat AI Inference Server 3.2RedHatrhaiis/vllm-cuda-rhel9:sha256:f0ab1b678e9447eae4b6b2fe5c58531aa8524133db157f196726164e4dc20492*
Red Hat AI Inference Server 3.2RedHatrhaiis/vllm-rocm-rhel9:sha256:e3b3efcdd86f60b90664a249d45918b2ac5f45bae5eed5399e310d63e878b287*
Red Hat AI Inference Server 3.2RedHatrhaiis/vllm-tpu-rhel9:sha256:64796b48c68d31973a08e22c9530c39b1bc3ba9f376bbefa57643ef0fc857534*
Red Hat AI Inference Server 3.2RedHatrhaiis/vllm-rocm-rhel9:sha256:c5efe40fa2a6e98d7d3d6676befff0dbbd87b2887769bb7e5856c5b0b0ada125*
Red Hat Ceph Storage 7RedHatrhceph/rhceph-7-rhel9:sha256:7ba9953f452becf20f89c2782fb5bf408bc96219ace5764943b78e07963cabf0*
Red Hat Ceph Storage 8RedHatrhceph/rhceph-8-rhel9:sha256:b09eb0a1d99e655de562919ded095bbb5dc65961e341a54ea59ad99b55ca9b1b*
Red Hat Discovery 2RedHatdiscovery/discovery-server-rhel9:sha256:75723049a444b5136e2d40920e2852f0840fecf60832a8bbb06e488fc9bba543*
Red Hat Discovery 2RedHatdiscovery/discovery-ui-rhel9:sha256:8af6fd7c8fe38d6bfd22e42810badde0aeeae738ea28667ae29dbc0cf4266f3e*
Red Hat Insights proxy 1.5RedHatinsights-proxy/insights-proxy-container-rhel9:sha256:1d72e553fe5a7696e600dc8fd2fe9050ba1992fa190bea622134ca7bfce7bb0d*
Libxml2Ubuntuesm-infra-legacy/trusty*
Libxml2Ubuntuesm-infra/bionic*
Libxml2Ubuntuesm-infra/focal*
Libxml2Ubuntuesm-infra/xenial*
Libxml2Ubuntujammy*
Libxml2Ubuntunoble*
Libxml2Ubuntuplucky*
Libxml2Ubuntuupstream*

Potential Mitigations

References