CVE-2025-65875
Unknown
Unknown - Not Provided
Arbitrary File Upload in FPDF AddFont() Enables Code Execution
Publication date: 2026-02-03
Last updated on: 2026-02-11
Assigner: MITRE
Description
Description
An arbitrary file upload vulnerability in the AddFont() function of FPDF v1.86 and earlier allows attackers to execute arbitrary code via uploading a crafted PHP file.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| fpdf | fpdf | 1.8.6 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-434 | The product allows the upload or transfer of dangerous file types that are automatically processed within its environment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an arbitrary file upload issue in the AddFont() function of FPDF version 1.86 and earlier. It allows attackers to upload a specially crafted PHP file, which can then be executed on the server.
Because the uploaded file can contain malicious code, this leads to the possibility of arbitrary code execution by the attacker.
How can this vulnerability impact me? :
The impact of this vulnerability is severe because it allows an attacker to execute arbitrary code on the affected system.
- Attackers can gain control over the server by uploading and running malicious PHP scripts.
- This can lead to data theft, data loss, or disruption of services.
- The vulnerability has a high CVSS score of 8.8, indicating high confidentiality, integrity, and availability impacts.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70