Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-jdtw-bn8z-e3b6
Vulnerability ID VCID-jdtw-bn8z-e3b6
Aliases CVE-2024-43398
GHSA-vmwr-mc7x-5vc3
Summary REXML denial of service vulnerability ### Impact The REXML gem before 3.3.6 has a DoS vulnerability when it parses an XML that has many deep elements that have same local name attributes. If you need to parse untrusted XMLs with tree parser API like `REXML::Document.new`, you may be impacted to this vulnerability. If you use other parser APIs such as stream parser API and SAX2 parser API, this vulnerability is not affected. ### Patches The REXML gem 3.3.6 or later include the patch to fix the vulnerability. ### Workarounds Don't parse untrusted XMLs with tree parser API. ### References * https://www.ruby-lang.org/en/news/2024/08/22/dos-rexml-cve-2024-43398/ : An announce on www.ruby-lang.org
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3 5.9 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-43398.json
epss 0.01135 https://api.first.org/data/v1/epss?cve=CVE-2024-43398
epss 0.01135 https://api.first.org/data/v1/epss?cve=CVE-2024-43398
epss 0.01135 https://api.first.org/data/v1/epss?cve=CVE-2024-43398
epss 0.01135 https://api.first.org/data/v1/epss?cve=CVE-2024-43398
epss 0.01135 https://api.first.org/data/v1/epss?cve=CVE-2024-43398
epss 0.01135 https://api.first.org/data/v1/epss?cve=CVE-2024-43398
epss 0.01135 https://api.first.org/data/v1/epss?cve=CVE-2024-43398
epss 0.01135 https://api.first.org/data/v1/epss?cve=CVE-2024-43398
epss 0.01135 https://api.first.org/data/v1/epss?cve=CVE-2024-43398
epss 0.01135 https://api.first.org/data/v1/epss?cve=CVE-2024-43398
epss 0.01167 https://api.first.org/data/v1/epss?cve=CVE-2024-43398
epss 0.01167 https://api.first.org/data/v1/epss?cve=CVE-2024-43398
epss 0.01167 https://api.first.org/data/v1/epss?cve=CVE-2024-43398
epss 0.01167 https://api.first.org/data/v1/epss?cve=CVE-2024-43398
cvssv3.1 7.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-vmwr-mc7x-5vc3
cvssv3.1 5.9 https://github.com/ruby/rexml
cvssv4 8.2 https://github.com/ruby/rexml
generic_textual HIGH https://github.com/ruby/rexml
cvssv3.1 5.9 https://github.com/ruby/rexml/commit/7cb5eaeb221c322b9912f724183294d8ce96bae3
cvssv4 8.2 https://github.com/ruby/rexml/commit/7cb5eaeb221c322b9912f724183294d8ce96bae3
generic_textual HIGH https://github.com/ruby/rexml/commit/7cb5eaeb221c322b9912f724183294d8ce96bae3
cvssv3.1 5.9 https://github.com/ruby/rexml/releases/tag/v3.3.6
cvssv4 8.2 https://github.com/ruby/rexml/releases/tag/v3.3.6
generic_textual HIGH https://github.com/ruby/rexml/releases/tag/v3.3.6
ssvc Track https://github.com/ruby/rexml/releases/tag/v3.3.6
cvssv3 5.9 https://github.com/ruby/rexml/security/advisories/GHSA-vmwr-mc7x-5vc3
cvssv3.1 5.9 https://github.com/ruby/rexml/security/advisories/GHSA-vmwr-mc7x-5vc3
cvssv3.1_qr HIGH https://github.com/ruby/rexml/security/advisories/GHSA-vmwr-mc7x-5vc3
cvssv4 8.2 https://github.com/ruby/rexml/security/advisories/GHSA-vmwr-mc7x-5vc3
generic_textual HIGH https://github.com/ruby/rexml/security/advisories/GHSA-vmwr-mc7x-5vc3
ssvc Track https://github.com/ruby/rexml/security/advisories/GHSA-vmwr-mc7x-5vc3
cvssv3.1 5.9 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rexml/CVE-2024-43398.yml
cvssv4 8.2 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rexml/CVE-2024-43398.yml
generic_textual HIGH https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rexml/CVE-2024-43398.yml
cvssv3.1 5.9 https://lists.debian.org/debian-lts-announce/2025/01/msg00011.html
cvssv4 8.2 https://lists.debian.org/debian-lts-announce/2025/01/msg00011.html
generic_textual HIGH https://lists.debian.org/debian-lts-announce/2025/01/msg00011.html
cvssv3.1 5.9 https://nvd.nist.gov/vuln/detail/CVE-2024-43398
cvssv4 8.2 https://nvd.nist.gov/vuln/detail/CVE-2024-43398
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2024-43398
cvssv3.1 5.9 https://security.netapp.com/advisory/ntap-20250103-0006
cvssv4 8.2 https://security.netapp.com/advisory/ntap-20250103-0006
generic_textual HIGH https://security.netapp.com/advisory/ntap-20250103-0006
cvssv3.1 5.9 https://www.ruby-lang.org/en/news/2024/08/22/dos-rexml-cve-2024-43398
cvssv4 8.2 https://www.ruby-lang.org/en/news/2024/08/22/dos-rexml-cve-2024-43398
generic_textual HIGH https://www.ruby-lang.org/en/news/2024/08/22/dos-rexml-cve-2024-43398
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-43398.json
https://api.first.org/data/v1/epss?cve=CVE-2024-43398
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43398
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/ruby/rexml
https://github.com/ruby/rexml/commit/7cb5eaeb221c322b9912f724183294d8ce96bae3
https://github.com/ruby/rexml/releases/tag/v3.3.6
https://github.com/ruby/rexml/security/advisories/GHSA-vmwr-mc7x-5vc3
https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rexml/CVE-2024-43398.yml
https://lists.debian.org/debian-lts-announce/2025/01/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2024-43398
https://security.netapp.com/advisory/ntap-20250103-0006
https://www.ruby-lang.org/en/news/2024/08/22/dos-rexml-cve-2024-43398
1083190 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1083190
2307297 https://bugzilla.redhat.com/show_bug.cgi?id=2307297
GHSA-vmwr-mc7x-5vc3 https://github.com/advisories/GHSA-vmwr-mc7x-5vc3
GLSA-202507-08 https://security.gentoo.org/glsa/202507-08
RHSA-2024:6670 https://access.redhat.com/errata/RHSA-2024:6670
RHSA-2024:6702 https://access.redhat.com/errata/RHSA-2024:6702
RHSA-2024:6703 https://access.redhat.com/errata/RHSA-2024:6703
RHSA-2024:6784 https://access.redhat.com/errata/RHSA-2024:6784
RHSA-2024:6785 https://access.redhat.com/errata/RHSA-2024:6785
RHSA-2025:4063 https://access.redhat.com/errata/RHSA-2025:4063
RHSA-2025:4488 https://access.redhat.com/errata/RHSA-2025:4488
USN-7256-1 https://usn.ubuntu.com/7256-1/
USN-7418-1 https://usn.ubuntu.com/7418-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-43398.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/ruby/rexml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N Found at https://github.com/ruby/rexml
Attack Vector (AV) Attack Complexity (AC) Attack Requirements (AT) Privileges Required (PR) User Interaction (UI) Vulnerable System Impact Confidentiality (VC) Vulnerable System Impact Integrity (VI) Vulnerable System Impact Availability (VA) Subsequent System Impact Confidentiality (SC) Subsequent System Impact Integrity (SI) Subsequent System Impact Availability (SA)

network

adjacent

local

physical

low

high

none

present

none

low

high

none

passive

active

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/ruby/rexml/commit/7cb5eaeb221c322b9912f724183294d8ce96bae3
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N Found at https://github.com/ruby/rexml/commit/7cb5eaeb221c322b9912f724183294d8ce96bae3
Attack Vector (AV) Attack Complexity (AC) Attack Requirements (AT) Privileges Required (PR) User Interaction (UI) Vulnerable System Impact Confidentiality (VC) Vulnerable System Impact Integrity (VI) Vulnerable System Impact Availability (VA) Subsequent System Impact Confidentiality (SC) Subsequent System Impact Integrity (SI) Subsequent System Impact Availability (SA)

network

adjacent

local

physical

low

high

none

present

none

low

high

none

passive

active

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/ruby/rexml/releases/tag/v3.3.6
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N Found at https://github.com/ruby/rexml/releases/tag/v3.3.6
Attack Vector (AV) Attack Complexity (AC) Attack Requirements (AT) Privileges Required (PR) User Interaction (UI) Vulnerable System Impact Confidentiality (VC) Vulnerable System Impact Integrity (VI) Vulnerable System Impact Availability (VA) Subsequent System Impact Confidentiality (SC) Subsequent System Impact Integrity (SI) Subsequent System Impact Availability (SA)

network

adjacent

local

physical

low

high

none

present

none

low

high

none

passive

active

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-22T14:43:15Z/ Found at https://github.com/ruby/rexml/releases/tag/v3.3.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/ruby/rexml/security/advisories/GHSA-vmwr-mc7x-5vc3
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N Found at https://github.com/ruby/rexml/security/advisories/GHSA-vmwr-mc7x-5vc3
Attack Vector (AV) Attack Complexity (AC) Attack Requirements (AT) Privileges Required (PR) User Interaction (UI) Vulnerable System Impact Confidentiality (VC) Vulnerable System Impact Integrity (VI) Vulnerable System Impact Availability (VA) Subsequent System Impact Confidentiality (SC) Subsequent System Impact Integrity (SI) Subsequent System Impact Availability (SA)

network

adjacent

local

physical

low

high

none

present

none

low

high

none

passive

active

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-22T14:43:15Z/ Found at https://github.com/ruby/rexml/security/advisories/GHSA-vmwr-mc7x-5vc3
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rexml/CVE-2024-43398.yml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N Found at https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rexml/CVE-2024-43398.yml
Attack Vector (AV) Attack Complexity (AC) Attack Requirements (AT) Privileges Required (PR) User Interaction (UI) Vulnerable System Impact Confidentiality (VC) Vulnerable System Impact Integrity (VI) Vulnerable System Impact Availability (VA) Subsequent System Impact Confidentiality (SC) Subsequent System Impact Integrity (SI) Subsequent System Impact Availability (SA)

network

adjacent

local

physical

low

high

none

present

none

low

high

none

passive

active

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.debian.org/debian-lts-announce/2025/01/msg00011.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N Found at https://lists.debian.org/debian-lts-announce/2025/01/msg00011.html
Attack Vector (AV) Attack Complexity (AC) Attack Requirements (AT) Privileges Required (PR) User Interaction (UI) Vulnerable System Impact Confidentiality (VC) Vulnerable System Impact Integrity (VI) Vulnerable System Impact Availability (VA) Subsequent System Impact Confidentiality (SC) Subsequent System Impact Integrity (SI) Subsequent System Impact Availability (SA)

network

adjacent

local

physical

low

high

none

present

none

low

high

none

passive

active

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2024-43398
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N Found at https://nvd.nist.gov/vuln/detail/CVE-2024-43398
Attack Vector (AV) Attack Complexity (AC) Attack Requirements (AT) Privileges Required (PR) User Interaction (UI) Vulnerable System Impact Confidentiality (VC) Vulnerable System Impact Integrity (VI) Vulnerable System Impact Availability (VA) Subsequent System Impact Confidentiality (SC) Subsequent System Impact Integrity (SI) Subsequent System Impact Availability (SA)

network

adjacent

local

physical

low

high

none

present

none

low

high

none

passive

active

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://security.netapp.com/advisory/ntap-20250103-0006
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N Found at https://security.netapp.com/advisory/ntap-20250103-0006
Attack Vector (AV) Attack Complexity (AC) Attack Requirements (AT) Privileges Required (PR) User Interaction (UI) Vulnerable System Impact Confidentiality (VC) Vulnerable System Impact Integrity (VI) Vulnerable System Impact Availability (VA) Subsequent System Impact Confidentiality (SC) Subsequent System Impact Integrity (SI) Subsequent System Impact Availability (SA)

network

adjacent

local

physical

low

high

none

present

none

low

high

none

passive

active

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://www.ruby-lang.org/en/news/2024/08/22/dos-rexml-cve-2024-43398
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N Found at https://www.ruby-lang.org/en/news/2024/08/22/dos-rexml-cve-2024-43398
Attack Vector (AV) Attack Complexity (AC) Attack Requirements (AT) Privileges Required (PR) User Interaction (UI) Vulnerable System Impact Confidentiality (VC) Vulnerable System Impact Integrity (VI) Vulnerable System Impact Availability (VA) Subsequent System Impact Confidentiality (SC) Subsequent System Impact Integrity (SI) Subsequent System Impact Availability (SA)

network

adjacent

local

physical

low

high

none

present

none

low

high

none

passive

active

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.78325
EPSS Score 0.01135
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:50:44.694742+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/08/GHSA-vmwr-mc7x-5vc3/GHSA-vmwr-mc7x-5vc3.json 38.0.0