CVE-2025-54869
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-06

Last updated on: 2025-08-06

Assigner: GitHub, Inc.

Description
FPDI is a collection of PHP classes that facilitate reading pages from existing PDF documents and using them as templates in FPDF. In versions 2.6.2 and below, any application that uses FPDI to process user-supplied PDF files is at risk, causing a Denial of Service (DoS) vulnerability. An attacker can upload a small, malicious PDF file that will cause the server-side script to crash due to memory exhaustion. Repeated attacks can lead to sustained service unavailability. This issue is fixed in version 2.6.3.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-06
Last Modified
2025-08-06
Generated
2026-05-06
AI Q&A
2025-08-06
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
setasign fpdi 2.6.4
setasign fpdi 2.6.3
setasign fpdi 2.6.2
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-770 The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in FPDI versions 2.6.2 and below, where processing user-supplied PDF files can lead to a Denial of Service (DoS). An attacker can upload a small malicious PDF that causes the server-side script to crash due to memory exhaustion, resulting in service disruption.


How can this vulnerability impact me? :

The vulnerability can cause your server-side application to crash and become unavailable when processing malicious PDF files, leading to denial of service and potential sustained service outages if attacks are repeated.


What immediate steps should I take to mitigate this vulnerability?

Upgrade FPDI to version 2.6.3 or later, as this version contains the fix for the Denial of Service vulnerability caused by processing malicious PDF files. Additionally, avoid processing untrusted or user-supplied PDF files with vulnerable versions of FPDI to prevent exploitation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart