๐Ÿ” CVE Alert

CVE-2026-8177

HIGH 7.5

XML::LibXML versions through 2.0210 for Perl read out-of-bounds heap memory when parsing XML node names containing truncated UTF-8 byte sequences

CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
1th

XML::LibXML versions through 2.0210 for Perl read out-of-bounds heap memory when parsing XML node names containing truncated UTF-8 byte sequences. A node name ending in the middle of a multi byte UTF-8 sequence causes the parser to read past the end of the input string into adjacent heap memory. Any Perl process that passes attacker controlled strings to XML::LibXML's DOM node-name methods can reach this path on the default API. The likely consequence is a crash, causing denial of service.

CWE CWE-125
Vendor shlomif
Product xml::libxml
Published May 10, 2026
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for shlomif xml::libxml

Be the first to know when new high vulnerabilities affecting shlomif xml::libxml are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

SHLOMIF / XML::LibXML
0 โ‰ค 2.0210

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/cpan-authors/XML-LibXML/issues/146 github.com: https://github.com/cpan-authors/XML-LibXML/pull/149 github.com: https://github.com/cpan-authors/XML-LibXML/commit/15652bd905a6c9dda59a81b14d4766adbbae2ea8.patch openwall.com: http://www.openwall.com/lists/oss-security/2026/05/10/8 openwall.com: http://www.openwall.com/lists/oss-security/2026/05/11/2