XML::LibXML versions through 2.0210 for Perl read out-of-bounds heap memory when parsing XML node names containing truncated UTF-8 byte sequences.
A node name ending in the middle of a multi byte UTF-8 sequence causes the parser to read past the end of the input string into adjacent heap memory.
Any Perl process that passes attacker controlled strings to XML::LibXML's DOM node-name methods can reach this path on the default API. The likely consequence is a crash, causing denial of service.
A node name ending in the middle of a multi byte UTF-8 sequence causes the parser to read past the end of the input string into adjacent heap memory.
Any Perl process that passes attacker controlled strings to XML::LibXML's DOM node-name methods can reach this path on the default API. The likely consequence is a crash, causing denial of service.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
Upgrade to a future XML::LibXML release, or apply the upstream patch.
Workaround
No workaround given by the vendor.
References
History
Sun, 10 May 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | XML::LibXML versions through 2.0210 for Perl read out-of-bounds heap memory when parsing XML node names containing truncated UTF-8 byte sequences. A node name ending in the middle of a multi byte UTF-8 sequence causes the parser to read past the end of the input string into adjacent heap memory. Any Perl process that passes attacker controlled strings to XML::LibXML's DOM node-name methods can reach this path on the default API. The likely consequence is a crash, causing denial of service. | |
| Title | XML::LibXML versions through 2.0210 for Perl read out-of-bounds heap memory when parsing XML node names containing truncated UTF-8 byte sequences | |
| Weaknesses | CWE-125 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CPANSec
Published:
Updated: 2026-05-10T20:53:26.345Z
Reserved: 2026-05-08T15:36:17.532Z
Link: CVE-2026-8177
No data.
Status : Received
Published: 2026-05-10T21:16:30.003
Modified: 2026-05-10T21:16:30.003
Link: CVE-2026-8177
No data.
OpenCVE Enrichment
Updated: 2026-05-10T22:30:21Z
Weaknesses