Vulnerability Description
XML Injection vulnerability in xmltodict allows Input Data Manipulation. This issue affects xmltodict: from 0.14.2 before 0.15.1. NOTE: the scope of this CVE is disputed by the vendor on the grounds that xmltodict.unparse() delegates element-name handling to Python's xml.sax.saxutils.XMLGenerator, and that XMLGenerator should be the component performing validation.
Related Weaknesses (CWE)
References
- https://fluidattacks.com/advisories/mono
- https://github.com/martinblech/xmltodict
- https://github.com/martinblech/xmltodict/blob/v0.15.1/CHANGELOG.md
- https://github.com/martinblech/xmltodict/commit/f98c90f071228ed73df997807298e1df
- https://docs.python.org/3/library/xml.sax.utils.html#xml.sax.saxutils.XMLGenerat
- https://docs.python.org/3/library/xml.sax.utils.html#xml.sax.saxutils.escape
- https://github.com/martinblech/xmltodict/issues/377#issuecomment-3255691923
FAQ
What is CVE-2025-9375?
CVE-2025-9375 is a documented vulnerability. XML Injection vulnerability in xmltodict allows Input Data Manipulation. This issue affects xmltodict: from 0.14.2 before 0.15.1. NOTE: the scope of this CVE is disputed by the vendor on the grounds ...
How severe is CVE-2025-9375?
CVSS scoring is not yet available for CVE-2025-9375. Check NVD for updates.
Is there a patch for CVE-2025-9375?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.