Search for packages
Package details: pkg:gem/rexml@3.2.3
purl pkg:gem/rexml@3.2.3
Next non-vulnerable version 3.3.9
Latest non-vulnerable version 3.3.9
Risk 4.5
Vulnerabilities affecting this package (7)
Vulnerability Summary Fixed by
VCID-5dfw-xgq5-5fay
Aliases:
CVE-2024-41123
GHSA-r55c-59qm-vjw6
REXML DoS vulnerability ### Impact The REXML gem before 3.3.2 has some DoS vulnerabilities when it parses an XML that has many specific characters such as whitespace character, `>]` and `]>`. If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities. ### Patches The REXML gem 3.3.3 or later include the patches to fix these vulnerabilities. ### Workarounds Don't parse untrusted XMLs. ### References * https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh : This is a similar vulnerability * https://github.com/ruby/rexml/security/advisories/GHSA-4xqq-m2hx-25v8 : This is a similar vulnerability * https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41123/: An announce on www.ruby-lang.org
3.3.3
Affected by 2 other vulnerabilities.
VCID-b44n-frjk-qfdy
Aliases:
CVE-2024-35176
GHSA-vg3r-rm7w-2xgh
REXML contains a denial of service vulnerability ### Impact The REXML gem before 3.2.6 has a DoS vulnerability when it parses an XML that has many `<`s in an attribute value. If you need to parse untrusted XMLs, you may be impacted to this vulnerability. ### Patches The REXML gem 3.2.7 or later include the patch to fix this vulnerability. ### Workarounds Don't parse untrusted XMLs. ### References * https://www.ruby-lang.org/en/news/2024/05/16/dos-rexml-cve-2024-35176/
3.2.7
Affected by 5 other vulnerabilities.
VCID-bdtz-3mgw-4kga
Aliases:
CVE-2024-49761
GHSA-2rxp-v6pw-ch6m
REXML ReDoS vulnerability ### Impact The REXML gem before 3.3.9 has a ReDoS vulnerability when it parses an XML that has many digits between `&#` and `x...;` in a hex numeric character reference (`&#x...;`). This does not happen with Ruby 3.2 or later. Ruby 3.1 is the only affected maintained Ruby. Note that Ruby 3.1 will reach EOL on 2025-03. ### Patches The REXML gem 3.3.9 or later include the patch to fix the vulnerability. ### Workarounds Use Ruby 3.2 or later instead of Ruby 3.1. ### References * https://www.ruby-lang.org/en/news/2024/10/28/redos-rexml-cve-2024-49761/: An announce on www.ruby-lang.org
3.3.9
Affected by 0 other vulnerabilities.
VCID-excx-35g6-abfe
Aliases:
CVE-2024-41946
GHSA-5866-49gr-22v4
REXML DoS vulnerability ### Impact The REXML gem before 3.3.2 has a DoS vulnerability when it parses an XML that has many entity expansions with SAX2 or pull parser API. If you need to parse untrusted XMLs with SAX2 or pull parser API, you may be impacted to this vulnerability. ### Patches The REXML gem 3.3.3 or later include the patch to fix the vulnerability. ### Workarounds Don't parse untrusted XMLs with SAX2 or pull parser API. ### References * https://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-rexml/ : This is a similar vulnerability * https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41946/: An announce on www.ruby-lang.org
3.3.3
Affected by 2 other vulnerabilities.
VCID-tuja-cuj6-pfe8
Aliases:
CVE-2024-39908
GHSA-4xqq-m2hx-25v8
REXML denial of service vulnerability ### Impact The REXML gem before 3.3.1 has some DoS vulnerabilities when it parses an XML that has many specific characters such as `<`, `0` and `%>`. If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities. ### Patches The REXML gem 3.3.2 or later include the patches to fix these vulnerabilities. ### Workarounds Don't parse untrusted XMLs. ### References * https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh : This is a similar vulnerability * https://www.ruby-lang.org/en/news/2024/07/16/dos-rexml-cve-2024-39908/
3.3.2
Affected by 4 other vulnerabilities.
VCID-v6kw-re7n-1ke3
Aliases:
CVE-2021-28965
GHSA-8cr8-4vfw-mr7h
incorrect calculation
3.2.5
Affected by 6 other vulnerabilities.
VCID-v8uu-3mwj-j3a9
Aliases:
CVE-2024-43398
GHSA-vmwr-mc7x-5vc3
REXML denial of service vulnerability ### Impact The REXML gem before 3.3.6 has a DoS vulnerability when it parses an XML that has many deep elements that have same local name attributes. If you need to parse untrusted XMLs with tree parser API like `REXML::Document.new`, you may be impacted to this vulnerability. If you use other parser APIs such as stream parser API and SAX2 parser API, this vulnerability is not affected. ### Patches The REXML gem 3.3.6 or later include the patch to fix the vulnerability. ### Workarounds Don't parse untrusted XMLs with tree parser API. ### References * https://www.ruby-lang.org/en/news/2024/08/22/dos-rexml-cve-2024-43398/ : An announce on www.ruby-lang.org
3.3.6
Affected by 1 other vulnerability.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2025-07-03T19:14:19.415114+00:00 GitLab Importer Affected by VCID-bdtz-3mgw-4kga https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rexml/CVE-2024-49761.yml 37.0.0
2025-07-03T19:10:41.855926+00:00 GitLab Importer Affected by VCID-v8uu-3mwj-j3a9 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rexml/CVE-2024-43398.yml 37.0.0
2025-07-03T19:09:59.025583+00:00 GitLab Importer Affected by VCID-excx-35g6-abfe https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rexml/CVE-2024-41946.yml 37.0.0
2025-07-03T19:09:57.250486+00:00 GitLab Importer Affected by VCID-5dfw-xgq5-5fay https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rexml/CVE-2024-41123.yml 37.0.0
2025-07-03T19:09:27.966014+00:00 GitLab Importer Affected by VCID-tuja-cuj6-pfe8 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rexml/CVE-2024-39908.yml 37.0.0
2025-07-03T19:05:28.879611+00:00 GitLab Importer Affected by VCID-b44n-frjk-qfdy https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rexml/CVE-2024-35176.yml 37.0.0
2025-07-03T17:58:26.164567+00:00 GitLab Importer Affected by VCID-v6kw-re7n-1ke3 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rexml/CVE-2021-28965.yml 37.0.0