CVE-2025-58767: REXML has DoS condition when parsing malformed XML file
(updated )
The REXML gems from 3.3.3 to 3.4.1 have a DoS vulnerability when parsing XML containing multiple XML declarations. If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities.
References
- github.com/advisories/GHSA-c2f4-jgmc-q2r5
- github.com/ruby/rexml
- github.com/ruby/rexml/commit/5859bdeac792687eaf93d8e8f0b7e3c1e2ed5c23
- github.com/ruby/rexml/security/advisories/GHSA-c2f4-jgmc-q2r5
- github.com/rubysec/ruby-advisory-db/blob/master/gems/rexml/CVE-2025-58767.yml
- nvd.nist.gov/vuln/detail/CVE-2025-58767
- www.ruby-lang.org/en/news/2025/09/18/dos-rexml-cve-2025-58767
Code Behaviors & Features
Detect and mitigate CVE-2025-58767 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →