CVE-2025-64512
BaseFortify
Publication date: 2025-11-10
Last updated on: 2025-12-31
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| pdfminer | pdfminer.six | to 2025-11-07 (exc) |
| debian | debian_linux | 11.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-502 | The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in pdfminer.six allows a malicious PDF file to specify an alternative zipped pickle file that contains arbitrary code. When pdfminer.six processes the PDF, it deserializes this malicious pickle file using pickle.loads(), which leads to automatic execution of the malicious code. This happens because the function CMapDB._load_data() trusts the pickle file specified by the PDF, as long as it ends with .pickle.gz.
How can this vulnerability impact me? :
If exploited, this vulnerability can lead to arbitrary code execution on the system processing the malicious PDF. This means an attacker could run harmful code, potentially leading to data theft, system compromise, or denial of service.
What immediate steps should I take to mitigate this vulnerability?
Upgrade pdfminer.six to version 20251107 or later, as this version fixes the vulnerability that allows arbitrary code execution via malicious pickle files.