Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-62bb-e8vk-7uh4
Vulnerability ID VCID-62bb-e8vk-7uh4
Aliases CVE-2026-0990
Summary libxml2: libxml2: Denial of Service via uncontrolled recursion in XML catalog processing
Status Published
Exploitability 0.5
Weighted Severity 5.3
Risk 2.6
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3.1 5.9 https://access.redhat.com/errata/RHSA-2026:7519
ssvc Track https://access.redhat.com/errata/RHSA-2026:7519
cvssv3 5.9 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0990.json
cvssv3.1 5.9 https://access.redhat.com/security/cve/CVE-2026-0990
ssvc Track https://access.redhat.com/security/cve/CVE-2026-0990
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2026-0990
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2026-0990
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2026-0990
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2026-0990
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2026-0990
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2026-0990
epss 0.0006 https://api.first.org/data/v1/epss?cve=CVE-2026-0990
epss 0.0006 https://api.first.org/data/v1/epss?cve=CVE-2026-0990
epss 0.0006 https://api.first.org/data/v1/epss?cve=CVE-2026-0990
epss 0.0006 https://api.first.org/data/v1/epss?cve=CVE-2026-0990
epss 0.0006 https://api.first.org/data/v1/epss?cve=CVE-2026-0990
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2026-0990
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2026-0990
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2026-0990
cvssv3.1 5.9 https://bugzilla.redhat.com/show_bug.cgi?id=2429959
ssvc Track https://bugzilla.redhat.com/show_bug.cgi?id=2429959
cvssv3.1 5.9 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 5.9 https://gitlab.gnome.org/GNOME/libxml2/-/issues/1018
ssvc Track https://gitlab.gnome.org/GNOME/libxml2/-/issues/1018
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0990.json
https://api.first.org/data/v1/epss?cve=CVE-2026-0990
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0990
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
1018 https://gitlab.gnome.org/GNOME/libxml2/-/issues/1018
1125695 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125695
2429959 https://bugzilla.redhat.com/show_bug.cgi?id=2429959
cpe:/a:redhat:hummingbird:1 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
cpe:/a:redhat:jboss_core_services:1 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_core_services:1
cpe:/a:redhat:openshift:4 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
cpe:/o:redhat:enterprise_linux:10 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:6 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
CVE-2026-0990 https://access.redhat.com/security/cve/CVE-2026-0990
RHSA-2026:7519 https://access.redhat.com/errata/RHSA-2026:7519
USN-7974-1 https://usn.ubuntu.com/7974-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2026:7519
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-15T16:31:20Z/ Found at https://access.redhat.com/errata/RHSA-2026:7519
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0990.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/security/cve/CVE-2026-0990
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-15T16:31:20Z/ Found at https://access.redhat.com/security/cve/CVE-2026-0990
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://bugzilla.redhat.com/show_bug.cgi?id=2429959
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-15T16:31:20Z/ Found at https://bugzilla.redhat.com/show_bug.cgi?id=2429959
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://gitlab.gnome.org/GNOME/libxml2/-/issues/1018
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-15T16:31:20Z/ Found at https://gitlab.gnome.org/GNOME/libxml2/-/issues/1018
Exploit Prediction Scoring System (EPSS)
Percentile 0.17648
EPSS Score 0.00056
Published At April 11, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:32:35.551172+00:00 RedHat Importer Import https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0990.json 38.0.0