Description

A flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT functions, such as the key() process, result in tree fragments, this corruption prevents the proper cleanup of ID attributes. As a result, the system may access freed memory, causing crashes or enabling attackers to trigger heap corruption.

INFO

Published Date :

2025-07-10T13:53:37.295Z

Last Modified :

2026-04-14T21:37:16.749Z

Source :

redhat
AFFECTED PRODUCTS

The following products are affected by CVE-2025-7425 vulnerability.

Vendors Products
Redhat
  • Cert Manager
  • Discovery
  • Enterprise Linux
  • Hummingbird
  • Insights Proxy
  • Openshift
  • Openshift Compliance Operator
  • Openshift Distributed Tracing
  • Openshift File Integrity Operator
  • Openshift Serverless
  • Rhel Aus
  • Rhel E4s
  • Rhel Els
  • Rhel Eus
  • Rhel Eus Long Life
  • Rhel Tus
  • Webterminal
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-7425.

URL Resource
http://seclists.org/fulldisclosure/2025/Aug/0 cve-icon
http://seclists.org/fulldisclosure/2025/Jul/30 cve-icon
http://seclists.org/fulldisclosure/2025/Jul/32 cve-icon
http://seclists.org/fulldisclosure/2025/Jul/35 cve-icon
http://seclists.org/fulldisclosure/2025/Jul/37 cve-icon
http://www.openwall.com/lists/oss-security/2025/07/11/2 cve-icon
https://access.redhat.com/errata/RHBA-2025:12345 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:12447 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:12450 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:13267 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:13308 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:13309 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:13310 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:13311 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:13312 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:13313 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:13314 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:13335 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:13464 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:13622 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:14059 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:14396 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:14818 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:14819 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:14853 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:14858 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:15308 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:15672 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:15827 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:15828 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:18219 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:21885 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:21913 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2026:0934 cve-icon cve-icon
https://access.redhat.com/security/cve/CVE-2025-7425 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=2379274 cve-icon cve-icon
https://gitlab.gnome.org/GNOME/libxslt/-/issues/140 cve-icon cve-icon cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2025/09/msg00035.html cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2025-7425 cve-icon
https://www.cve.org/CVERecord?id=CVE-2025-7425 cve-icon

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact