{"id":"CVE-2024-34391","details":"libxmljs is vulnerable to a type confusion vulnerability when parsing a specially crafted XML while invoking a function on the result of attrs() that was called on a parsed node. This vulnerability might lead to denial of service (on both 32-bit systems and 64-bit systems), data leak, infinite loop and remote code execution (on 32-bit systems with the XML_PARSE_HUGE flag enabled).","aliases":["GHSA-6433-x5p4-8jc7"],"modified":"2026-04-10T05:12:54.266442Z","published":"2024-05-02T19:15:06.177Z","references":[{"type":"REPORT","url":"https://github.com/libxmljs/libxmljs/issues/645"},{"type":"EVIDENCE","url":"https://research.jfrog.com/vulnerabilities/libxmljs-attrs-type-confusion-rce-jfsa-2024-001033988/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libxmljs/libxmljs","events":[{"introduced":"0"},{"fixed":"3121013c0e447d267bf4514317c52ad81670f2f5"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.0.11"}]}}],"versions":["0.3.0","0.4.0","0.4.1","0.4.3","0.5.0","0.5.1","0.5.2","0.5.3","0.5.4","v0.1.0","v0.10.0","v0.11.0","v0.11.1","v0.12.0","v0.13.0","v0.14.0","v0.14.1","v0.14.2","v0.14.3","v0.15.0","v0.16.0","v0.16.1","v0.17.0","v0.17.1","v0.18.0","v0.18.1","v0.18.2","v0.18.3","v0.18.4","v0.18.5","v0.18.6","v0.18.7","v0.18.8","v0.19.0","v0.19.10","v0.19.2","v0.19.3","v0.19.4","v0.19.5","v0.19.6","v0.19.7","v0.19.8","v0.19.9","v0.2.0","v0.6.0","v0.6.1","v0.7.0","v0.8.0","v0.8.1","v0.9.0","v1.0.0","v1.0.1","v1.0.10","v1.0.2","v1.0.6","v1.0.7","v1.0.8","v1.0.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-34391.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}