CVE-2025-11683
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to potentially read sensitive information from memory by exploiting a flaw in how certain YAML files are processed, specifically those with complex structures and empty values. It requires the attacker to provide a specially crafted YAML file to trigger the issue, but there’s no evidence that it can lead to more severe memory corruption or control over the system.
Technical Description
YAML::Syck versions before 1.36 for Perl has missing null-terminators which causes out-of-bounds read and potential information disclosure Missing null terminators in token.c leads to but-of-bounds read which allows adjacent variable to be read The issue is seen with complex YAML files with a hash of all keys and empty values. There is no indication that the issue leads to accessing memory outside that allocated to the module.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Oct 16, 2025
6 months ago
Last Modified
Mar 9, 2026
29 days ago
Vendor
toddr
Product
yaml\