Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-6xng-bfkg-jfa4
Vulnerability ID VCID-6xng-bfkg-jfa4
Aliases CVE-2025-13601
Summary glib: Integer overflow in in g_escape_uri_string()
Status Published
Exploitability 0.5
Weighted Severity 6.9
Risk 3.5
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3.1 7.7 https://access.redhat.com/errata/RHSA-2026:0936
ssvc Track https://access.redhat.com/errata/RHSA-2026:0936
cvssv3.1 7.7 https://access.redhat.com/errata/RHSA-2026:0975
ssvc Track https://access.redhat.com/errata/RHSA-2026:0975
cvssv3.1 7.7 https://access.redhat.com/errata/RHSA-2026:0991
ssvc Track https://access.redhat.com/errata/RHSA-2026:0991
cvssv3.1 7.7 https://access.redhat.com/errata/RHSA-2026:1323
ssvc Track https://access.redhat.com/errata/RHSA-2026:1323
cvssv3.1 7.7 https://access.redhat.com/errata/RHSA-2026:1324
ssvc Track https://access.redhat.com/errata/RHSA-2026:1324
cvssv3.1 7.7 https://access.redhat.com/errata/RHSA-2026:1326
ssvc Track https://access.redhat.com/errata/RHSA-2026:1326
cvssv3.1 7.7 https://access.redhat.com/errata/RHSA-2026:1327
ssvc Track https://access.redhat.com/errata/RHSA-2026:1327
cvssv3.1 7.7 https://access.redhat.com/errata/RHSA-2026:1465
ssvc Track https://access.redhat.com/errata/RHSA-2026:1465
cvssv3.1 7.7 https://access.redhat.com/errata/RHSA-2026:1608
ssvc Track https://access.redhat.com/errata/RHSA-2026:1608
cvssv3.1 7.7 https://access.redhat.com/errata/RHSA-2026:1624
ssvc Track https://access.redhat.com/errata/RHSA-2026:1624
cvssv3.1 7.7 https://access.redhat.com/errata/RHSA-2026:1625
ssvc Track https://access.redhat.com/errata/RHSA-2026:1625
cvssv3.1 7.7 https://access.redhat.com/errata/RHSA-2026:1626
ssvc Track https://access.redhat.com/errata/RHSA-2026:1626
cvssv3.1 7.7 https://access.redhat.com/errata/RHSA-2026:1627
ssvc Track https://access.redhat.com/errata/RHSA-2026:1627
cvssv3.1 7.7 https://access.redhat.com/errata/RHSA-2026:1652
ssvc Track https://access.redhat.com/errata/RHSA-2026:1652
cvssv3.1 7.7 https://access.redhat.com/errata/RHSA-2026:1736
ssvc Track https://access.redhat.com/errata/RHSA-2026:1736
cvssv3.1 7.7 https://access.redhat.com/errata/RHSA-2026:2064
ssvc Track https://access.redhat.com/errata/RHSA-2026:2064
cvssv3.1 7.7 https://access.redhat.com/errata/RHSA-2026:2072
ssvc Track https://access.redhat.com/errata/RHSA-2026:2072
cvssv3.1 7.7 https://access.redhat.com/errata/RHSA-2026:2485
ssvc Track https://access.redhat.com/errata/RHSA-2026:2485
cvssv3.1 7.7 https://access.redhat.com/errata/RHSA-2026:2563
ssvc Track https://access.redhat.com/errata/RHSA-2026:2563
cvssv3.1 7.7 https://access.redhat.com/errata/RHSA-2026:2633
ssvc Track https://access.redhat.com/errata/RHSA-2026:2633
cvssv3.1 7.7 https://access.redhat.com/errata/RHSA-2026:2659
ssvc Track https://access.redhat.com/errata/RHSA-2026:2659
cvssv3.1 7.7 https://access.redhat.com/errata/RHSA-2026:2671
ssvc Track https://access.redhat.com/errata/RHSA-2026:2671
cvssv3.1 7.7 https://access.redhat.com/errata/RHSA-2026:2974
ssvc Track https://access.redhat.com/errata/RHSA-2026:2974
cvssv3.1 7.7 https://access.redhat.com/errata/RHSA-2026:3415
ssvc Track https://access.redhat.com/errata/RHSA-2026:3415
cvssv3.1 7.7 https://access.redhat.com/errata/RHSA-2026:4419
ssvc Track https://access.redhat.com/errata/RHSA-2026:4419
cvssv3 7.7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13601.json
cvssv3.1 7.7 https://access.redhat.com/security/cve/CVE-2025-13601
ssvc Track https://access.redhat.com/security/cve/CVE-2025-13601
epss 0.00011 https://api.first.org/data/v1/epss?cve=CVE-2025-13601
epss 0.00011 https://api.first.org/data/v1/epss?cve=CVE-2025-13601
epss 0.00011 https://api.first.org/data/v1/epss?cve=CVE-2025-13601
epss 0.00011 https://api.first.org/data/v1/epss?cve=CVE-2025-13601
epss 0.00011 https://api.first.org/data/v1/epss?cve=CVE-2025-13601
epss 0.00011 https://api.first.org/data/v1/epss?cve=CVE-2025-13601
epss 0.00011 https://api.first.org/data/v1/epss?cve=CVE-2025-13601
epss 0.00011 https://api.first.org/data/v1/epss?cve=CVE-2025-13601
cvssv3.1 7.7 https://bugzilla.redhat.com/show_bug.cgi?id=2416741
ssvc Track https://bugzilla.redhat.com/show_bug.cgi?id=2416741
cvssv3.1 7.7 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 7.7 https://gitlab.gnome.org/GNOME/glib/-/issues/3827
ssvc Track https://gitlab.gnome.org/GNOME/glib/-/issues/3827
cvssv3.1 7.7 https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914
ssvc Track https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13601.json
https://api.first.org/data/v1/epss?cve=CVE-2025-13601
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13601
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
1121488 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121488
2416741 https://bugzilla.redhat.com/show_bug.cgi?id=2416741
3827 https://gitlab.gnome.org/GNOME/glib/-/issues/3827
4914 https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914
cpe:/a:redhat:ceph_storage:8::el9 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:8::el9
cpe:/a:redhat:discovery:2::el9 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
cpe:/a:redhat:enterprise_linux:8::crb https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
cpe:/a:redhat:enterprise_linux:9::appstream https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
cpe:/a:redhat:enterprise_linux:9::crb https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
cpe:/a:redhat:hummingbird:1 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
cpe:/a:redhat:insights_proxy:1.5::el9 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
cpe:/a:redhat:openshift:4.12::el8 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el8
cpe:/a:redhat:openshift:4.13::el9 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el9
cpe:/a:redhat:openshift:4.14::el9 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el9
cpe:/a:redhat:openshift:4.15::el9 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.15::el9
cpe:/a:redhat:openshift:4.16::el9 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.16::el9
cpe:/a:redhat:openshift:4.17::el9 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.17::el9
cpe:/a:redhat:openshift:4.18::el9 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.18::el9
cpe:/a:redhat:openshift:4.19::el9 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.19::el9
cpe:/a:redhat:rhel_e4s:9.0::appstream https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
cpe:/a:redhat:rhel_e4s:9.2::appstream https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
cpe:/a:redhat:rhel_eus:9.4::appstream https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
cpe:/a:redhat:rhel_eus:9.4::crb https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
cpe:/a:redhat:rhel_eus:9.6::appstream https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
cpe:/a:redhat:rhel_eus:9.6::crb https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::crb
cpe:/a:redhat:rhui:5::el9 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhui:5::el9
cpe:/o:redhat:enterprise_linux:10 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:10.1 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
cpe:/o:redhat:enterprise_linux:6 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:8 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:8::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
cpe:/o:redhat:enterprise_linux:9 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
cpe:/o:redhat:enterprise_linux:9::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
cpe:/o:redhat:enterprise_linux_eus:10.0 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux_eus:10.0
cpe:/o:redhat:rhel_aus:8.2::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
cpe:/o:redhat:rhel_aus:8.4::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
cpe:/o:redhat:rhel_aus:8.6::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
cpe:/o:redhat:rhel_e4s:8.6::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
cpe:/o:redhat:rhel_e4s:8.8::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
cpe:/o:redhat:rhel_e4s:9.0::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.0::baseos
cpe:/o:redhat:rhel_e4s:9.2::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
cpe:/o:redhat:rhel_els:7 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
cpe:/o:redhat:rhel_eus:9.4::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
cpe:/o:redhat:rhel_eus:9.6::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.6::baseos
cpe:/o:redhat:rhel_eus_long_life:8.4::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
cpe:/o:redhat:rhel_tus:8.6::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
cpe:/o:redhat:rhel_tus:8.8::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.8::baseos
CVE-2025-13601 https://access.redhat.com/security/cve/CVE-2025-13601
RHSA-2026:0936 https://access.redhat.com/errata/RHSA-2026:0936
RHSA-2026:0975 https://access.redhat.com/errata/RHSA-2026:0975
RHSA-2026:0991 https://access.redhat.com/errata/RHSA-2026:0991
RHSA-2026:1323 https://access.redhat.com/errata/RHSA-2026:1323
RHSA-2026:1324 https://access.redhat.com/errata/RHSA-2026:1324
RHSA-2026:1326 https://access.redhat.com/errata/RHSA-2026:1326
RHSA-2026:1327 https://access.redhat.com/errata/RHSA-2026:1327
RHSA-2026:1465 https://access.redhat.com/errata/RHSA-2026:1465
RHSA-2026:1608 https://access.redhat.com/errata/RHSA-2026:1608
RHSA-2026:1624 https://access.redhat.com/errata/RHSA-2026:1624
RHSA-2026:1625 https://access.redhat.com/errata/RHSA-2026:1625
RHSA-2026:1626 https://access.redhat.com/errata/RHSA-2026:1626
RHSA-2026:1627 https://access.redhat.com/errata/RHSA-2026:1627
RHSA-2026:1652 https://access.redhat.com/errata/RHSA-2026:1652
RHSA-2026:1736 https://access.redhat.com/errata/RHSA-2026:1736
RHSA-2026:2064 https://access.redhat.com/errata/RHSA-2026:2064
RHSA-2026:2072 https://access.redhat.com/errata/RHSA-2026:2072
RHSA-2026:2485 https://access.redhat.com/errata/RHSA-2026:2485
RHSA-2026:2563 https://access.redhat.com/errata/RHSA-2026:2563
RHSA-2026:2633 https://access.redhat.com/errata/RHSA-2026:2633
RHSA-2026:2659 https://access.redhat.com/errata/RHSA-2026:2659
RHSA-2026:2671 https://access.redhat.com/errata/RHSA-2026:2671
RHSA-2026:2974 https://access.redhat.com/errata/RHSA-2026:2974
RHSA-2026:3415 https://access.redhat.com/errata/RHSA-2026:3415
RHSA-2026:4419 https://access.redhat.com/errata/RHSA-2026:4419
USN-7942-1 https://usn.ubuntu.com/7942-1/
USN-7942-2 https://usn.ubuntu.com/7942-2/
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:0936
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/ Found at https://access.redhat.com/errata/RHSA-2026:0936
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:0975
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/ Found at https://access.redhat.com/errata/RHSA-2026:0975
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:0991
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/ Found at https://access.redhat.com/errata/RHSA-2026:0991
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:1323
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/ Found at https://access.redhat.com/errata/RHSA-2026:1323
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:1324
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/ Found at https://access.redhat.com/errata/RHSA-2026:1324
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:1326
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/ Found at https://access.redhat.com/errata/RHSA-2026:1326
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:1327
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/ Found at https://access.redhat.com/errata/RHSA-2026:1327
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:1465
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/ Found at https://access.redhat.com/errata/RHSA-2026:1465
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:1608
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/ Found at https://access.redhat.com/errata/RHSA-2026:1608
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:1624
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/ Found at https://access.redhat.com/errata/RHSA-2026:1624
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:1625
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/ Found at https://access.redhat.com/errata/RHSA-2026:1625
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:1626
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/ Found at https://access.redhat.com/errata/RHSA-2026:1626
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:1627
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/ Found at https://access.redhat.com/errata/RHSA-2026:1627
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:1652
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/ Found at https://access.redhat.com/errata/RHSA-2026:1652
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:1736
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/ Found at https://access.redhat.com/errata/RHSA-2026:1736
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:2064
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/ Found at https://access.redhat.com/errata/RHSA-2026:2064
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:2072
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/ Found at https://access.redhat.com/errata/RHSA-2026:2072
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:2485
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/ Found at https://access.redhat.com/errata/RHSA-2026:2485
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:2563
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/ Found at https://access.redhat.com/errata/RHSA-2026:2563
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:2633
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/ Found at https://access.redhat.com/errata/RHSA-2026:2633
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:2659
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/ Found at https://access.redhat.com/errata/RHSA-2026:2659
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:2671
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/ Found at https://access.redhat.com/errata/RHSA-2026:2671
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:2974
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/ Found at https://access.redhat.com/errata/RHSA-2026:2974
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:3415
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/ Found at https://access.redhat.com/errata/RHSA-2026:3415
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:4419
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/ Found at https://access.redhat.com/errata/RHSA-2026:4419
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13601.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Found at https://access.redhat.com/security/cve/CVE-2025-13601
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/ Found at https://access.redhat.com/security/cve/CVE-2025-13601
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Found at https://bugzilla.redhat.com/show_bug.cgi?id=2416741
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/ Found at https://bugzilla.redhat.com/show_bug.cgi?id=2416741
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Found at https://gitlab.gnome.org/GNOME/glib/-/issues/3827
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/ Found at https://gitlab.gnome.org/GNOME/glib/-/issues/3827
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Found at https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/ Found at https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914
Exploit Prediction Scoring System (EPSS)
Percentile 0.01281
EPSS Score 0.00011
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:34:51.526604+00:00 RedHat Importer Import https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13601.json 38.0.0