CVE-2025-9375

medium

Description

XML Injection vulnerability in xmltodict allows Input Data Manipulation. This issue affects xmltodict: from 0.14.2 before 0.15.1. NOTE: the scope of this CVE is disputed by the vendor on the grounds that xmltodict.unparse() delegates element-name handling to Python's xml.sax.saxutils.XMLGenerator, and that XMLGenerator should be the component performing validation.

References

https://github.com/martinblech/xmltodict/issues/377#issuecomment-3255691923

https://github.com/martinblech/xmltodict/commit/f98c90f071228ed73df997807298e1df4f790c33

https://github.com/martinblech/xmltodict/blob/v0.15.1/CHANGELOG.md

https://github.com/martinblech/xmltodict

https://fluidattacks.com/advisories/mono

https://docs.python.org/3/library/xml.sax.utils.html#xml.sax.saxutils.escape

https://docs.python.org/3/library/xml.sax.utils.html#xml.sax.saxutils.XMLGenerator

Details

Source: Mitre, NVD

Published: 2025-09-01

Updated: 2026-04-20

Risk Information

CVSS v2

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 5.3

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Severity: Medium

CVSS v4

Base Score: 6.9

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

Severity: Medium

EPSS

EPSS: 0.00042