CVE-2026-41080
Published: 16 April 2026
Summary
CVE-2026-41080 is a low-severity Insufficient Entropy (CWE-331) vulnerability in Libexpat Project Libexpat. Its CVSS base score is 2.9 (Low).
Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 9.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and RA-5 (Vulnerability Monitoring and Scanning).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely remediation of the libexpat insufficient entropy flaw by upgrading to version 2.8.0 or later, directly eliminating hash flooding from crafted XML.
Enables scanning to identify systems with vulnerable libexpat versions prior to 2.8.0, facilitating targeted flaw remediation.
Implements safeguards to limit the availability impact of local denial-of-service attacks via hash table collisions in libexpat.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability in libexpat XML parser enables local crafted input to trigger hash collisions for application resource exhaustion and DoS via software exploitation.
NVD Description
libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.
Deeper analysisAI
CVE-2026-41080 affects libexpat versions prior to 2.8.0, where insufficient entropy in hash functions allows hash flooding through a crafted XML document. This vulnerability, classified under CWE-331 (Insufficient Entropy), enables denial-of-service conditions by degrading performance via hash table collisions. The CVSS v3.1 base score is 2.9 (AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L), reflecting low severity due to its local attack vector, high attack complexity, and limited impact on availability.
A local attacker with no privileges required can exploit this by supplying a malicious XML document to an application using the vulnerable libexpat library. The crafted input triggers hash flooding, causing excessive computation and partial denial of service, such as slowed processing or resource exhaustion in the affected component, without impacting confidentiality or integrity.
Advisories recommend upgrading to libexpat 2.8.0, which addresses the entropy issue as detailed in the release announcement on the hartwork blog, GitHub issue #47, pull request #1183, and oss-security mailing list posts from April 26, 2026. These resources confirm the fix improves hash randomization to prevent flooding attacks.
Details
- CWE(s)