diff --git a/advisories/unreviewed/2026/02/GHSA-qg2f-7w4r-25f2/GHSA-qg2f-7w4r-25f2.json b/advisories/unreviewed/2026/02/GHSA-qg2f-7w4r-25f2/GHSA-qg2f-7w4r-25f2.json index 0819e0fc6035b..c031ecbcfc619 100644 --- a/advisories/unreviewed/2026/02/GHSA-qg2f-7w4r-25f2/GHSA-qg2f-7w4r-25f2.json +++ b/advisories/unreviewed/2026/02/GHSA-qg2f-7w4r-25f2/GHSA-qg2f-7w4r-25f2.json @@ -6,6 +6,7 @@ "aliases": [ "CVE-2025-10990" ], + "summary": "ReDoS vulnerability in REXML", "details": "A flaw was found in REXML. A remote attacker could exploit inefficient regular expression (regex) parsing when processing hex numeric character references (&#x...;) in XML documents. This could lead to a Regular Expression Denial of Service (ReDoS), impacting the availability of the affected component. This issue is the result of an incomplete fix for CVE-2024-49761.", "severity": [ { @@ -13,7 +14,24 @@ "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "RubyGems", + "name": "rexml" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY",