{"id":"JLSEC-2025-59","summary":"libexpat through 2.5.0 allows recursive XML Entity Expansion if XML_DTD is undefined at compile time...","details":"libexpat through 2.5.0 allows recursive XML Entity Expansion if XML_DTD is undefined at compile time.","modified":"2026-05-01T18:01:42.755825Z","published":"2025-10-14T15:35:41.198Z","upstream":["CVE-2023-52426"],"database_specific":{"sources":[{"modified":"2025-11-04T19:16:22.923Z","id":"CVE-2023-52426","html_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52426","published":"2024-02-04T20:15:46.120Z","url":"https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2023-52426","imported":"2026-04-30T20:01:46.016Z","database_specific":{"status":"Modified"}}],"license":"CC-BY-4.0"},"references":[{"type":"WEB","url":"https://cwe.mitre.org/data/definitions/776.html"},{"type":"WEB","url":"https://github.com/libexpat/libexpat/commit/0f075ec8ecb5e43f8fdca5182f8cca4703da0404"},{"type":"WEB","url":"https://github.com/libexpat/libexpat/pull/777"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNRIHC7DVVRAIWFRGV23Y6UZXFBXSQDB/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNUBSGZFEZOBHJFTAD42SAN4ATW2VEMV/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNRIHC7DVVRAIWFRGV23Y6UZXFBXSQDB/"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20240307-0005/"}],"affected":[{"package":{"name":"Expat_jll","ecosystem":"Julia","purl":"pkg:julia/Expat_jll?uuid=2e619515-83b5-522b-bb60-26c02a35a201"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"2.6.2+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-59.json"}}],"schema_version":"1.7.5"}