Cyber Posture

CVE-2025-0899

High

Published: 11 February 2025

Published
11 February 2025
Modified
12 February 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0042 61.7th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

PDF-XChange Editor AcroForm Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25349.

Security Summary

CVE-2025-0899 is a Use-After-Free vulnerability (CWE-416) affecting PDF-XChange Editor, specifically within its handling of AcroForms. The flaw arises from the software's failure to validate the existence of an object before performing operations on it, which can lead to remote code execution on affected installations. Published on 2025-02-11, it has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).

Remote attackers can exploit this vulnerability by luring targets to visit a malicious webpage or open a malicious PDF file, as user interaction is required. Upon successful exploitation, attackers achieve arbitrary code execution in the context of the PDF-XChange Editor process.

The Zero Day Initiative advisory ZDI-25-061, originally tracking the issue as ZDI-CAN-25349, provides further details on the vulnerability.

Details

CWE(s)
CWE-416

Affected Products

pdf-xchange
pdf-xchange editor
≤ 10.4.1.389

References