CVE-2025-6642
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-25

Last updated on: 2025-07-01

Assigner: Zero Day Initiative

Description
PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26530.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-25
Last Modified
2025-07-01
Generated
2026-05-07
AI Q&A
2025-06-26
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
pdf-xchange pdf-tools 10.5.2.395
pdf-xchange pdf-xchange_editor 10.5.2.395
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-125 The product reads data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a remote code execution flaw in PDF-XChange Editor related to the parsing of U3D files. It occurs because the software does not properly validate user-supplied data, leading to an out-of-bounds read past the end of an allocated object. An attacker can exploit this by convincing a user to open a malicious file or visit a malicious page, allowing the attacker to execute arbitrary code within the context of the affected process.


How can this vulnerability impact me? :

If exploited, this vulnerability can allow an attacker to execute arbitrary code on your system with the privileges of the PDF-XChange Editor process. This could lead to unauthorized actions such as installing malware, stealing data, or taking control of the affected system. Exploitation requires user interaction, such as opening a malicious file or visiting a malicious webpage.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart