Search for vulnerabilities
Vulnerability details: VCID-v8uu-3mwj-j3a9
Vulnerability ID VCID-v8uu-3mwj-j3a9
Aliases CVE-2024-43398
GHSA-vmwr-mc7x-5vc3
Summary REXML denial of service vulnerability ### Impact The REXML gem before 3.3.6 has a DoS vulnerability when it parses an XML that has many deep elements that have same local name attributes. If you need to parse untrusted XMLs with tree parser API like `REXML::Document.new`, you may be impacted to this vulnerability. If you use other parser APIs such as stream parser API and SAX2 parser API, this vulnerability is not affected. ### Patches The REXML gem 3.3.6 or later include the patch to fix the vulnerability. ### Workarounds Don't parse untrusted XMLs with tree parser API. ### References * https://www.ruby-lang.org/en/news/2024/08/22/dos-rexml-cve-2024-43398/ : An announce on www.ruby-lang.org
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3 5.9 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-43398.json
epss 0.00177 https://api.first.org/data/v1/epss?cve=CVE-2024-43398
epss 0.00177 https://api.first.org/data/v1/epss?cve=CVE-2024-43398
epss 0.00177 https://api.first.org/data/v1/epss?cve=CVE-2024-43398
epss 0.00177 https://api.first.org/data/v1/epss?cve=CVE-2024-43398
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2024-43398
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2024-43398
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2024-43398
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2024-43398
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2024-43398
epss 0.00225 https://api.first.org/data/v1/epss?cve=CVE-2024-43398
epss 0.00225 https://api.first.org/data/v1/epss?cve=CVE-2024-43398
epss 0.00225 https://api.first.org/data/v1/epss?cve=CVE-2024-43398
cvssv3.1 7.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-vmwr-mc7x-5vc3
cvssv3.1 5.9 https://github.com/ruby/rexml
generic_textual HIGH https://github.com/ruby/rexml
cvssv3.1 5.9 https://github.com/ruby/rexml/commit/7cb5eaeb221c322b9912f724183294d8ce96bae3
generic_textual HIGH https://github.com/ruby/rexml/commit/7cb5eaeb221c322b9912f724183294d8ce96bae3
cvssv3.1 5.9 https://github.com/ruby/rexml/releases/tag/v3.3.6
generic_textual HIGH https://github.com/ruby/rexml/releases/tag/v3.3.6
ssvc Track https://github.com/ruby/rexml/releases/tag/v3.3.6
cvssv3 5.9 https://github.com/ruby/rexml/security/advisories/GHSA-vmwr-mc7x-5vc3
cvssv3.1 5.9 https://github.com/ruby/rexml/security/advisories/GHSA-vmwr-mc7x-5vc3
cvssv3.1_qr HIGH https://github.com/ruby/rexml/security/advisories/GHSA-vmwr-mc7x-5vc3
generic_textual HIGH https://github.com/ruby/rexml/security/advisories/GHSA-vmwr-mc7x-5vc3
ssvc Track https://github.com/ruby/rexml/security/advisories/GHSA-vmwr-mc7x-5vc3
cvssv3.1 5.9 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rexml/CVE-2024-43398.yml
generic_textual HIGH https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rexml/CVE-2024-43398.yml
cvssv3.1 5.9 https://nvd.nist.gov/vuln/detail/CVE-2024-43398
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2024-43398
cvssv3.1 5.9 https://security.netapp.com/advisory/ntap-20250103-0006
generic_textual HIGH https://security.netapp.com/advisory/ntap-20250103-0006
cvssv3.1 5.9 https://www.ruby-lang.org/en/news/2024/08/22/dos-rexml-cve-2024-43398
generic_textual HIGH https://www.ruby-lang.org/en/news/2024/08/22/dos-rexml-cve-2024-43398
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-43398.json
https://api.first.org/data/v1/epss?cve=CVE-2024-43398
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43398
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/ruby/rexml
https://github.com/ruby/rexml/commit/7cb5eaeb221c322b9912f724183294d8ce96bae3
https://github.com/ruby/rexml/releases/tag/v3.3.6
https://github.com/ruby/rexml/security/advisories/GHSA-vmwr-mc7x-5vc3
https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rexml/CVE-2024-43398.yml
https://nvd.nist.gov/vuln/detail/CVE-2024-43398
https://security.netapp.com/advisory/ntap-20250103-0006
https://security.netapp.com/advisory/ntap-20250103-0006/
https://www.ruby-lang.org/en/news/2024/08/22/dos-rexml-cve-2024-43398
1083190 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1083190
2307297 https://bugzilla.redhat.com/show_bug.cgi?id=2307297
GHSA-vmwr-mc7x-5vc3 https://github.com/advisories/GHSA-vmwr-mc7x-5vc3
RHSA-2024:6670 https://access.redhat.com/errata/RHSA-2024:6670
RHSA-2024:6702 https://access.redhat.com/errata/RHSA-2024:6702
RHSA-2024:6703 https://access.redhat.com/errata/RHSA-2024:6703
RHSA-2024:6784 https://access.redhat.com/errata/RHSA-2024:6784
RHSA-2024:6785 https://access.redhat.com/errata/RHSA-2024:6785
RHSA-2025:4063 https://access.redhat.com/errata/RHSA-2025:4063
RHSA-2025:4488 https://access.redhat.com/errata/RHSA-2025:4488
USN-7256-1 https://usn.ubuntu.com/7256-1/
USN-7418-1 https://usn.ubuntu.com/7418-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-43398.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/ruby/rexml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/ruby/rexml/commit/7cb5eaeb221c322b9912f724183294d8ce96bae3
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/ruby/rexml/releases/tag/v3.3.6
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-22T14:43:15Z/ Found at https://github.com/ruby/rexml/releases/tag/v3.3.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/ruby/rexml/security/advisories/GHSA-vmwr-mc7x-5vc3
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-22T14:43:15Z/ Found at https://github.com/ruby/rexml/security/advisories/GHSA-vmwr-mc7x-5vc3
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rexml/CVE-2024-43398.yml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2024-43398
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://security.netapp.com/advisory/ntap-20250103-0006
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://www.ruby-lang.org/en/news/2024/08/22/dos-rexml-cve-2024-43398
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.39796
EPSS Score 0.00177
Published At July 12, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-01T12:10:12.565190+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/08/GHSA-vmwr-mc7x-5vc3/GHSA-vmwr-mc7x-5vc3.json 36.1.3