CVE-2025-43718
BaseFortify
Publication date: 2025-10-01
Last updated on: 2025-10-06
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| poppler | poppler | 25.* |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-674 | The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Poppler versions 24.06.1 through 25.x before 25.04.0 allows excessive stack consumption and causes a segmentation fault (SIGSEGV) due to deeply nested structures within the metadata of a PDF document. Specifically, it occurs in functions like Dict::lookup and Catalog::getMetadata when processing complex metadata such as a long pdfsubver string with regular expressions, leading to deep recursion in the regex executor.
How can this vulnerability impact me? :
The vulnerability can cause a program using the affected Poppler versions to crash unexpectedly due to stack overflow and segmentation faults when processing maliciously crafted PDF metadata. This can lead to denial of service or instability in applications relying on Poppler for PDF processing.