Search for vulnerabilities
Vulnerability details: VCID-9r6n-66y4-3be2
Vulnerability ID VCID-9r6n-66y4-3be2
Aliases CVE-2025-6170
Summary A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 2.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6170.json
cvssv3.1 2.5 https://access.redhat.com/security/cve/CVE-2025-6170
ssvc Track https://access.redhat.com/security/cve/CVE-2025-6170
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2025-6170
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2025-6170
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2025-6170
epss 0.00016 https://api.first.org/data/v1/epss?cve=CVE-2025-6170
epss 0.00016 https://api.first.org/data/v1/epss?cve=CVE-2025-6170
epss 0.00016 https://api.first.org/data/v1/epss?cve=CVE-2025-6170
epss 0.00016 https://api.first.org/data/v1/epss?cve=CVE-2025-6170
epss 0.00016 https://api.first.org/data/v1/epss?cve=CVE-2025-6170
epss 0.00016 https://api.first.org/data/v1/epss?cve=CVE-2025-6170
epss 0.00016 https://api.first.org/data/v1/epss?cve=CVE-2025-6170
epss 0.00016 https://api.first.org/data/v1/epss?cve=CVE-2025-6170
epss 0.00016 https://api.first.org/data/v1/epss?cve=CVE-2025-6170
epss 0.00016 https://api.first.org/data/v1/epss?cve=CVE-2025-6170
epss 0.00016 https://api.first.org/data/v1/epss?cve=CVE-2025-6170
epss 0.00016 https://api.first.org/data/v1/epss?cve=CVE-2025-6170
epss 0.00016 https://api.first.org/data/v1/epss?cve=CVE-2025-6170
epss 0.00018 https://api.first.org/data/v1/epss?cve=CVE-2025-6170
epss 0.00018 https://api.first.org/data/v1/epss?cve=CVE-2025-6170
cvssv3.1 2.5 https://bugzilla.redhat.com/show_bug.cgi?id=2372952
ssvc Track https://bugzilla.redhat.com/show_bug.cgi?id=2372952
cvssv3.1 4.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 2.5 https://nvd.nist.gov/vuln/detail/CVE-2025-6170
archlinux High https://security.archlinux.org/AVG-2898
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6170.json
https://api.first.org/data/v1/epss?cve=CVE-2025-6170
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6170
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
1107938 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107938
AVG-2898 https://security.archlinux.org/AVG-2898
cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:/a:redhat:jboss_core_services:1 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_core_services:1
cpe:/a:redhat:openshift:4 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
cpe:/o:redhat:enterprise_linux:10 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:6 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
CVE-2025-6170 https://access.redhat.com/security/cve/CVE-2025-6170
show_bug.cgi?id=2372952 https://bugzilla.redhat.com/show_bug.cgi?id=2372952
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6170.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L Found at https://access.redhat.com/security/cve/CVE-2025-6170
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-16T16:05:03Z/ Found at https://access.redhat.com/security/cve/CVE-2025-6170
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L Found at https://bugzilla.redhat.com/show_bug.cgi?id=2372952
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-16T16:05:03Z/ Found at https://bugzilla.redhat.com/show_bug.cgi?id=2372952
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L Found at https://nvd.nist.gov/vuln/detail/CVE-2025-6170
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.0175
EPSS Score 0.00015
Published At Aug. 13, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T09:25:26.202641+00:00 Vulnrichment Import https://github.com/cisagov/vulnrichment/blob/develop/2025/6xxx/CVE-2025-6170.json 37.0.0