CVE-2025-57108
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-31

Last updated on: 2025-11-05

Assigner: MITRE

Description
Kitware VTK (Visualization Toolkit) through 9.5.0 contains a heap use-after-free vulnerability in vtkGLTFDocumentLoader. The vulnerability manifests during mesh object copy operations where vector members are accessed after the underlying memory has been freed, specifically when handling GLTF files with corrupted or invalid mesh reference structures.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-31
Last Modified
2025-11-05
Generated
2026-05-07
AI Q&A
2025-11-01
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
vtk vtk to 9.5.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-416 The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a heap use-after-free issue in Kitware VTK (Visualization Toolkit) up to version 9.5.0, specifically in the vtkGLTFDocumentLoader component. It occurs during mesh object copy operations when vector members are accessed after their underlying memory has already been freed. This happens particularly when processing GLTF files that contain corrupted or invalid mesh reference structures. [1]


How can this vulnerability impact me? :

The vulnerability can lead to severe impacts including unauthorized remote code execution, data corruption, or application crashes because it allows attackers to exploit the use-after-free condition remotely without any privileges or user interaction. The CVSS score of 9.8 indicates a critical severity with high impact on confidentiality, integrity, and availability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart