Cyber Posture

CVE-2025-0907

High

Published: 11 February 2025

Published
11 February 2025
Modified
12 February 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0016 36.1th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

PDF-XChange Editor JB2 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JB2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-25435.

Security Summary

CVE-2025-0907 is a JB2 file parsing out-of-bounds read information disclosure vulnerability in PDF-XChange Editor. The flaw occurs due to a lack of proper validation of user-supplied data during JB2 file parsing, resulting in a read past the end of an allocated object. This issue affects installations of PDF-XChange Editor and was publicly disclosed on 2025-02-11, with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) and is associated with CWE-125.

Remote attackers can exploit this vulnerability to disclose sensitive information, but user interaction is required, such as the target visiting a malicious web page or opening a malicious file. No privileges are needed (PR:N), and the attack is network-accessible (AV:N) with low complexity (AC:L). While primarily enabling information disclosure, the vulnerability can be leveraged in conjunction with other flaws to achieve arbitrary code execution in the context of the current process.

The Zero Day Initiative advisory (ZDI-25-069, ZDI-CAN-25435) provides further details at https://www.zerodayinitiative.com/advisories/ZDI-25-069/.

Details

CWE(s)
CWE-125

Affected Products

pdf-xchange
pdf-xchange editor
≤ 10.4.2.390

References