CVE-2025-14405
Uncontrolled Search Path Vulnerability in PDFsam Enhanced Enables Privilege Escalation
Publication date: 2025-12-23
Last updated on: 2025-12-23
Assigner: Zero Day Initiative
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openssl | openssl | * |
| pdfsam | enhanced | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-427 | The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in PDFsam Enhanced involves an uncontrolled search path element related to OpenSSL configuration. Specifically, the product loads an OpenSSL configuration file from an unsecured location. An attacker who can physically mount a malicious drive onto the target system can exploit this flaw to escalate privileges and execute arbitrary code with SYSTEM-level access.
How can this vulnerability impact me? :
If exploited, this vulnerability allows an attacker with physical access to escalate their privileges on the affected system to SYSTEM level, potentially leading to full control over the system, unauthorized code execution, and compromise of sensitive data or system integrity.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, ensure that the OpenSSL configuration file is loaded from a secure location that cannot be influenced by an attacker. Prevent attackers from mounting malicious drives on the system by restricting physical access and controlling removable media usage. Applying any available patches or updates from PDFsam Enhanced or OpenSSL vendors is also recommended.