REXML is an XML toolkit for Ruby. The REXML gem before 3.3.6 has a DoS vulnerability when it parses an XML that has many deep elements that have same local name attributes. If you need to parse untrusted XMLs with tree parser API like REXML::Document.new, you may be impacted to this vulnerability. If you use other parser APIs such as stream parser API and SAX2 parser API, this vulnerability is not affected. The REXML gem 3.3.6 or later include the patch to fix the vulnerability.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-4018-1 ruby2.7 security update
EUVD EUVD EUVD-2024-2666 REXML is an XML toolkit for Ruby. The REXML gem before 3.3.6 has a DoS vulnerability when it parses an XML that has many deep elements that have same local name attributes. If you need to parse untrusted XMLs with tree parser API like REXML::Document.new, you may be impacted to this vulnerability. If you use other parser APIs such as stream parser API and SAX2 parser API, this vulnerability is not affected. The REXML gem 3.3.6 or later include the patch to fix the vulnerability.
Github GHSA Github GHSA GHSA-vmwr-mc7x-5vc3 REXML denial of service vulnerability
Ubuntu USN Ubuntu USN USN-7256-1 Ruby vulnerabilities
Ubuntu USN Ubuntu USN USN-7418-1 Ruby vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 04 Nov 2025 06:30:00 +0900

Type Values Removed Values Added
References

Sat, 20 Sep 2025 01:00:00 +0900

Type Values Removed Values Added
First Time appeared Netapp
Netapp bootstrap Os
Netapp hci Compute Node
Ruby-lang
Ruby-lang rexml
CPEs cpe:2.3:a:ruby-lang:rexml:*:*:*:*:*:ruby:*:*
cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*
Vendors & Products Netapp
Netapp bootstrap Os
Netapp hci Compute Node
Ruby-lang
Ruby-lang rexml

Sat, 12 Jul 2025 22:45:00 +0900

Type Values Removed Values Added
Metrics epss

{'score': 0.00225}

epss

{'score': 0.00177}


Fri, 03 Jan 2025 21:45:00 +0900

Type Values Removed Values Added
References

Thu, 19 Sep 2024 15:30:00 +0900

Type Values Removed Values Added
CPEs cpe:/a:redhat:enterprise_linux:8
cpe:/a:redhat:enterprise_linux:9

Tue, 17 Sep 2024 11:30:00 +0900

Type Values Removed Values Added
First Time appeared Redhat rhel E4s
Redhat rhel Eus
Redhat rhel Tus
CPEs cpe:/a:redhat:rhel_e4s:8.6::highavailability
cpe:/a:redhat:rhel_eus:8.8::highavailability
cpe:/a:redhat:rhel_tus:8.6::highavailability
Vendors & Products Redhat rhel E4s
Redhat rhel Eus
Redhat rhel Tus

Mon, 16 Sep 2024 23:45:00 +0900

Type Values Removed Values Added
First Time appeared Redhat
Redhat enterprise Linux
CPEs cpe:/a:redhat:enterprise_linux:8::highavailability
Vendors & Products Redhat
Redhat enterprise Linux

Sat, 24 Aug 2024 12:15:00 +0900

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Fri, 23 Aug 2024 00:30:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 22 Aug 2024 23:30:00 +0900

Type Values Removed Values Added
Description REXML is an XML toolkit for Ruby. The REXML gem before 3.3.6 has a DoS vulnerability when it parses an XML that has many deep elements that have same local name attributes. If you need to parse untrusted XMLs with tree parser API like REXML::Document.new, you may be impacted to this vulnerability. If you use other parser APIs such as stream parser API and SAX2 parser API, this vulnerability is not affected. The REXML gem 3.3.6 or later include the patch to fix the vulnerability.
Title REXML denial of service vulnerability
Weaknesses CWE-776
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-11-03T20:38:50.990Z

Reserved: 2024-08-12T18:02:04.965Z

Link: CVE-2024-43398

cve-icon Vulnrichment

Updated: 2025-11-03T20:38:50.990Z

cve-icon NVD

Status : Modified

Published: 2024-08-22T15:15:16.440

Modified: 2025-11-03T21:16:18.923

Link: CVE-2024-43398

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-08-22T15:15:16Z

Links: CVE-2024-43398 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses