CVE-2025-14405: CWE-427: Uncontrolled Search Path Element in PDFsam Enhanced
PDFsam Enhanced Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows phyiscally-present attackers to escalate privileges on affected installations of PDFsam Enhanced. An attacker must first obtain the ability to mount a malicious drive onto the target system in order to exploit this vulnerability. The specific flaw exists within the configuration of OpenSSL. The product loads an OpenSSL configuration file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-27867.
AI Analysis
Technical Summary
CVE-2025-14405 is a local privilege escalation vulnerability classified under CWE-427 (Uncontrolled Search Path Element) affecting PDFsam Enhanced version 7.0.76.15222. The vulnerability stems from the product loading its OpenSSL configuration file from an insecure and uncontrolled location, which can be manipulated by an attacker. Specifically, the software searches for the OpenSSL configuration file in a path that can be influenced by mounting a malicious drive. An attacker with physical presence on the machine can mount a crafted drive containing a malicious OpenSSL configuration file. When PDFsam Enhanced loads this configuration, it executes arbitrary code embedded within it with SYSTEM-level privileges. This allows the attacker to escalate from a limited user context to full system control without requiring user interaction. The CVSS 3.0 score is 6.6, reflecting medium severity, with attack vector as physical (AV:P), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). No patches or known exploits are currently available, but the vulnerability was publicly disclosed on December 23, 2025. The flaw is significant because it leverages a common cryptographic library (OpenSSL) configuration loading mechanism, which is often trusted and runs with high privileges. Organizations using this version of PDFsam Enhanced in environments where physical security is limited are particularly vulnerable.
Potential Impact
For European organizations, the impact of CVE-2025-14405 can be severe in scenarios where physical access to systems is possible, such as in shared office spaces, public terminals, or poorly secured facilities. Successful exploitation leads to SYSTEM-level code execution, allowing attackers to compromise sensitive data, install persistent malware, or disrupt critical services. This can result in data breaches violating GDPR regulations, operational downtime, and reputational damage. Since PDFsam Enhanced is used for PDF manipulation, organizations handling sensitive documents (legal, financial, governmental) are at higher risk. The vulnerability's reliance on physical access limits remote exploitation but does not eliminate risk in environments with insider threats or inadequate physical controls. The lack of patches increases exposure until remediation is available. The medium severity rating indicates a significant but not critical threat, emphasizing the importance of physical security and monitoring in affected environments.
Mitigation Recommendations
1. Enforce strict physical security controls to prevent unauthorized personnel from accessing or connecting external drives to systems running PDFsam Enhanced. 2. Implement endpoint security solutions that detect and block unauthorized removable media or alert on new device mounts. 3. Restrict user permissions to prevent mounting of external drives where possible, or use device control policies to whitelist approved devices. 4. Monitor system logs for unusual activity related to drive mounting or OpenSSL configuration file access. 5. Once available, promptly apply vendor patches or updates addressing this vulnerability. 6. Consider running PDFsam Enhanced in a sandboxed or containerized environment to limit the impact of potential exploitation. 7. Educate staff about the risks of physical access attacks and enforce clean desk policies to reduce insider threats. 8. Regularly audit installed software versions to identify and upgrade vulnerable instances of PDFsam Enhanced.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-14405: CWE-427: Uncontrolled Search Path Element in PDFsam Enhanced
Description
PDFsam Enhanced Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows phyiscally-present attackers to escalate privileges on affected installations of PDFsam Enhanced. An attacker must first obtain the ability to mount a malicious drive onto the target system in order to exploit this vulnerability. The specific flaw exists within the configuration of OpenSSL. The product loads an OpenSSL configuration file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-27867.
AI-Powered Analysis
Technical Analysis
CVE-2025-14405 is a local privilege escalation vulnerability classified under CWE-427 (Uncontrolled Search Path Element) affecting PDFsam Enhanced version 7.0.76.15222. The vulnerability stems from the product loading its OpenSSL configuration file from an insecure and uncontrolled location, which can be manipulated by an attacker. Specifically, the software searches for the OpenSSL configuration file in a path that can be influenced by mounting a malicious drive. An attacker with physical presence on the machine can mount a crafted drive containing a malicious OpenSSL configuration file. When PDFsam Enhanced loads this configuration, it executes arbitrary code embedded within it with SYSTEM-level privileges. This allows the attacker to escalate from a limited user context to full system control without requiring user interaction. The CVSS 3.0 score is 6.6, reflecting medium severity, with attack vector as physical (AV:P), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). No patches or known exploits are currently available, but the vulnerability was publicly disclosed on December 23, 2025. The flaw is significant because it leverages a common cryptographic library (OpenSSL) configuration loading mechanism, which is often trusted and runs with high privileges. Organizations using this version of PDFsam Enhanced in environments where physical security is limited are particularly vulnerable.
Potential Impact
For European organizations, the impact of CVE-2025-14405 can be severe in scenarios where physical access to systems is possible, such as in shared office spaces, public terminals, or poorly secured facilities. Successful exploitation leads to SYSTEM-level code execution, allowing attackers to compromise sensitive data, install persistent malware, or disrupt critical services. This can result in data breaches violating GDPR regulations, operational downtime, and reputational damage. Since PDFsam Enhanced is used for PDF manipulation, organizations handling sensitive documents (legal, financial, governmental) are at higher risk. The vulnerability's reliance on physical access limits remote exploitation but does not eliminate risk in environments with insider threats or inadequate physical controls. The lack of patches increases exposure until remediation is available. The medium severity rating indicates a significant but not critical threat, emphasizing the importance of physical security and monitoring in affected environments.
Mitigation Recommendations
1. Enforce strict physical security controls to prevent unauthorized personnel from accessing or connecting external drives to systems running PDFsam Enhanced. 2. Implement endpoint security solutions that detect and block unauthorized removable media or alert on new device mounts. 3. Restrict user permissions to prevent mounting of external drives where possible, or use device control policies to whitelist approved devices. 4. Monitor system logs for unusual activity related to drive mounting or OpenSSL configuration file access. 5. Once available, promptly apply vendor patches or updates addressing this vulnerability. 6. Consider running PDFsam Enhanced in a sandboxed or containerized environment to limit the impact of potential exploitation. 7. Educate staff about the risks of physical access attacks and enforce clean desk policies to reduce insider threats. 8. Regularly audit installed software versions to identify and upgrade vulnerable instances of PDFsam Enhanced.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- zdi
- Date Reserved
- 2025-12-10T01:37:24.865Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 694b0a12d69af40f312b7da5
Added to database: 12/23/2025, 9:30:58 PM
Last enriched: 12/23/2025, 10:05:06 PM
Last updated: 12/24/2025, 3:23:37 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15050: Unrestricted Upload in code-projects Student File Management System
MediumCVE-2025-15048: Command Injection in Tenda WH450
MediumCVE-2025-68696: CWE-918: Server-Side Request Forgery (SSRF) in jnunemaker httparty
HighCVE-2025-68665: CWE-502: Deserialization of Untrusted Data in langchain-ai langchainjs
HighCVE-2025-15049: SQL Injection in code-projects Online Farm System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.