Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14402: CWE-356: Product UI does not Warn User of Unsafe Actions in PDFsam Enhanced

0
High
VulnerabilityCVE-2025-14402cvecve-2025-14402cwe-356
Published: Tue Dec 23 2025 (12/23/2025, 21:21:10 UTC)
Source: CVE Database V5
Vendor/Project: PDFsam
Product: Enhanced

Description

PDFsam Enhanced DOC File Insufficient UI Warning Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDFsam Enhanced. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of DOC files. The issue results from allowing the execution of dangerous script without user warning. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27499.

AI-Powered Analysis

AILast updated: 12/30/2025, 23:56:49 UTC

Technical Analysis

CVE-2025-14402 is a remote code execution vulnerability identified in PDFsam Enhanced version 7.0.76.15222, specifically related to the processing of DOC files. The root cause is a CWE-356 weakness, where the product's user interface does not provide adequate warnings to users when potentially unsafe actions are about to be performed. This insufficient UI warning allows malicious scripts embedded within DOC files to execute without user awareness. Exploitation requires user interaction, such as opening a crafted DOC file or visiting a malicious webpage that triggers the vulnerability. The attack vector is local (AV:L) with high attack complexity (AC:H), no privileges required (PR:N), but user interaction is necessary (UI:R). The vulnerability impacts confidentiality, integrity, and availability (all rated high), as arbitrary code execution can lead to data theft, system compromise, or denial of service. Although no public exploits are currently known, the vulnerability was assigned a CVSS v3.0 score of 7.0, indicating a high severity level. The vulnerability was reserved and published in December 2025, with the original discovery credited to the Zero Day Initiative (ZDI) under identifier ZDI-CAN-27499. No patches or updates have been linked yet, so affected users must rely on interim mitigations. The vulnerability highlights the risk of insufficient user interface feedback in security-critical applications, emphasizing the need for clear warnings when executing potentially dangerous content.

Potential Impact

For European organizations, this vulnerability poses a significant threat, especially in sectors that heavily rely on document processing and PDF manipulation, such as legal, financial, government, and healthcare institutions. Successful exploitation could lead to unauthorized code execution, resulting in data breaches, intellectual property theft, ransomware deployment, or disruption of critical services. Since the attack requires user interaction, phishing campaigns or malicious document distribution could be effective vectors. The impact is heightened in environments where users have elevated privileges or where endpoint security controls are weak. Additionally, the lack of patches increases the window of exposure. Organizations with remote or hybrid workforces may face increased risk due to potentially less controlled environments. The vulnerability could also be leveraged as a foothold for lateral movement within networks, escalating the overall risk posture. The confidentiality, integrity, and availability of sensitive data and systems are all at risk, potentially leading to regulatory non-compliance and reputational damage.

Mitigation Recommendations

1. Immediately restrict or disable the use of PDFsam Enhanced version 7.0.76.15222 for processing DOC files until a patch is available. 2. Educate users about the risks of opening DOC files from untrusted sources and the importance of verifying document origins. 3. Implement email and web gateway filtering to block or quarantine suspicious DOC files and malicious URLs. 4. Employ endpoint detection and response (EDR) solutions to monitor for anomalous script execution or process behavior related to PDFsam Enhanced. 5. Enforce the principle of least privilege to limit user rights, reducing the impact of potential code execution. 6. Use application whitelisting to prevent unauthorized execution of scripts or binaries spawned by PDFsam Enhanced. 7. Monitor logs for unusual activity associated with PDFsam Enhanced processes. 8. Stay alert for official patches or updates from PDFsam and apply them promptly once released. 9. Consider sandboxing or isolating document processing workflows to contain potential exploitation. 10. Regularly review and update security awareness training to include this specific threat vector.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
zdi
Date Reserved
2025-12-10T01:37:13.574Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 694b0a12d69af40f312b7d9c

Added to database: 12/23/2025, 9:30:58 PM

Last enriched: 12/30/2025, 11:56:49 PM

Last updated: 2/7/2026, 1:18:42 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats