CVE-2025-11683

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to potentially read sensitive information from memory by exploiting a flaw in how certain YAML files are processed, specifically those with complex structures and empty values. It requires the attacker to provide a specially crafted YAML file to trigger the issue, but there’s no evidence that it can lead to more severe memory corruption or control over the system.

Technical Description

YAML::Syck versions before 1.36 for Perl has missing null-terminators which causes out-of-bounds read and potential information disclosure Missing null terminators in token.c leads to but-of-bounds read which allows adjacent variable to be read The issue is seen with complex YAML files with a hash of all keys and empty values.  There is no indication that the issue leads to accessing memory outside that allocated to the module.

CVSS Vector Analysis

Attack VectorAdjacent Network
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactNone
Availability ImpactNone
ScopeUnchanged

Vector String

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$931($500-$1K)
Vendor Response
Grade FPatched in 144 days

Quick Information

Published

Oct 16, 2025

6 months ago

Last Modified

Mar 9, 2026

29 days ago

Vendor

toddr

Product

yaml\