libexpat_project CVE Vulnerabilities & Metrics

Focus on libexpat_project vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About libexpat_project Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with libexpat_project. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total libexpat_project CVEs: 32
Earliest CVE date: 03 Nov 2009, 16:30 UTC
Latest CVE date: 30 Aug 2024, 03:15 UTC

Latest CVE reference: CVE-2024-45492

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 4

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical libexpat_project CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 4.97

Max CVSS: 9.0

Critical CVEs (≥9): 1

CVSS Range vs. Count

Range Count
0.0-3.9 8
4.0-6.9 19
7.0-8.9 10
9.0-10.0 1

CVSS Distribution Chart

Top 5 Highest CVSS libexpat_project CVEs

These are the five CVEs with the highest CVSS scores for libexpat_project, sorted by severity first and recency.

All CVEs for libexpat_project

An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX).

An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX).

An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer.

libexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external parsers (created via XML_ExternalEntityParserCreate).

libexpat through 2.5.0 allows recursive XML Entity Expansion if XML_DTD is undefined at compile time.

libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed.

In libexpat through 2.4.9, there is a use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate in out-of-memory situations.

libexpat before 2.4.9 has a use-after-free in the doContent function in xmlparse.c.

CVE-2022-25315 libexpat_project vulnerability CVSS: 7.5 18 Feb 2022, 05:15 UTC

In Expat (aka libexpat) before 2.4.5, there is an integer overflow in storeRawNames.

CVE-2022-25314 libexpat_project vulnerability CVSS: 5.0 18 Feb 2022, 05:15 UTC

In Expat (aka libexpat) before 2.4.5, there is an integer overflow in copyString.

CVE-2022-25313 libexpat_project vulnerability CVSS: 4.3 18 Feb 2022, 05:15 UTC

In Expat (aka libexpat) before 2.4.5, an attacker can trigger stack exhaustion in build_model via a large nesting depth in the DTD element.

CVE-2022-25236 libexpat_project vulnerability CVSS: 7.5 16 Feb 2022, 01:15 UTC

xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.

CVE-2022-25235 libexpat_project vulnerability CVSS: 7.5 16 Feb 2022, 01:15 UTC

xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context.

CVE-2022-23990 libexpat_project vulnerability CVSS: 5.0 26 Jan 2022, 19:15 UTC

Expat (aka libexpat) before 2.4.4 has an integer overflow in the doProlog function.

CVE-2022-23852 libexpat_project vulnerability CVSS: 7.5 24 Jan 2022, 02:15 UTC

Expat (aka libexpat) before 2.4.4 has a signed integer overflow in XML_GetBuffer, for configurations with a nonzero XML_CONTEXT_BYTES.

CVE-2022-22827 libexpat_project vulnerability CVSS: 6.8 10 Jan 2022, 14:12 UTC

storeAtts in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.

CVE-2022-22826 libexpat_project vulnerability CVSS: 6.8 10 Jan 2022, 14:12 UTC

nextScaffoldPart in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.

CVE-2022-22825 libexpat_project vulnerability CVSS: 6.8 10 Jan 2022, 14:12 UTC

lookup in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.

CVE-2022-22824 libexpat_project vulnerability CVSS: 7.5 10 Jan 2022, 14:12 UTC

defineAttribute in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.

CVE-2022-22823 libexpat_project vulnerability CVSS: 7.5 10 Jan 2022, 14:12 UTC

build_model in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.

CVE-2022-22822 libexpat_project vulnerability CVSS: 7.5 10 Jan 2022, 14:12 UTC

addBinding in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.

CVE-2021-46143 libexpat_project vulnerability CVSS: 6.8 06 Jan 2022, 04:15 UTC

In doProlog in xmlparse.c in Expat (aka libexpat) before 2.4.3, an integer overflow exists for m_groupSize.

CVE-2021-45960 libexpat_project vulnerability CVSS: 9.0 01 Jan 2022, 19:15 UTC

In Expat (aka libexpat) before 2.4.3, a left shift by 29 (or more) places in the storeAtts function in xmlparse.c can lead to realloc misbehavior (e.g., allocating too few bytes, or only freeing memory).

CVE-2019-15903 libexpat_project vulnerability CVSS: 5.0 04 Sep 2019, 06:15 UTC

In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.

CVE-2018-20843 libexpat_project vulnerability CVSS: 7.8 24 Jun 2019, 17:15 UTC

In libexpat in Expat before 2.2.7, XML input including XML names that contain a large number of colons could make the XML parser consume a high amount of RAM and CPU resources while processing (enough to be usable for denial-of-service attacks).

CVE-2017-11742 libexpat_project vulnerability CVSS: 4.6 30 Jul 2017, 14:29 UTC

The writeRandomBytes_RtlGenRandom function in xmlparse.c in libexpat in Expat 2.2.1 and 2.2.2 on Windows allows local users to gain privileges via a Trojan horse ADVAPI32.DLL in the current working directory because of an untrusted search path, aka DLL hijacking.

CVE-2017-9233 libexpat_project vulnerability CVSS: 5.0 25 Jul 2017, 20:29 UTC

XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD.

CVE-2016-4472 libexpat_project vulnerability CVSS: 6.8 30 Jun 2016, 17:59 UTC

The overflow protection in Expat is removed by compilers with certain optimization settings, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted XML data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1283 and CVE-2015-2716.

CVE-2016-5300 libexpat_project vulnerability CVSS: 7.8 16 Jun 2016, 18:59 UTC

The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876.

CVE-2012-6702 libexpat_project vulnerability CVSS: 4.3 16 Jun 2016, 18:59 UTC

Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.

CVE-2016-0718 libexpat_project vulnerability CVSS: 7.5 26 May 2016, 16:59 UTC

Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.

CVE-2015-1283 libexpat_project vulnerability CVSS: 6.8 23 Jul 2015, 00:59 UTC

Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted XML data, a related issue to CVE-2015-2716.

CVE-2013-0340 libexpat_project vulnerability CVSS: 6.8 21 Jan 2014, 18:55 UTC

expat 2.1.0 and earlier does not properly handle entities expansion unless an application developer uses the XML_SetEntityDeclHandler function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue. NOTE: it could be argued that because expat already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed, and each affected application would need its own CVE.

CVE-2012-1148 libexpat_project vulnerability CVSS: 5.0 03 Jul 2012, 19:55 UTC

Memory leak in the poolGrow function in expat/lib/xmlparse.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (memory consumption) via a large number of crafted XML files that cause improperly-handled reallocation failures when expanding entities.

CVE-2012-1147 libexpat_project vulnerability CVSS: 4.3 03 Jul 2012, 19:55 UTC

readfilemap.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (file descriptor consumption) via a large number of crafted XML files.

CVE-2012-0876 libexpat_project vulnerability CVSS: 4.3 03 Jul 2012, 19:55 UTC

The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value.

CVE-2009-3560 libexpat_project vulnerability CVSS: 5.0 04 Dec 2009, 21:30 UTC

The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.

CVE-2009-3720 libexpat_project vulnerability CVSS: 5.0 03 Nov 2009, 16:30 UTC

The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.