Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14413: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Soda PDF Desktop

0
High
VulnerabilityCVE-2025-14413cvecve-2025-14413cwe-22
Published: Tue Dec 23 2025 (12/23/2025, 21:24:11 UTC)
Source: CVE Database V5
Vendor/Project: Soda PDF
Product: Desktop

Description

Soda PDF Desktop CBZ File Parsing Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Soda PDF Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of CBZ files. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27509.

AI-Powered Analysis

AILast updated: 01/02/2026, 23:55:36 UTC

Technical Analysis

CVE-2025-14413 is a path traversal vulnerability classified under CWE-22 affecting Soda PDF Desktop version 14.0.509.23030. The vulnerability exists in the CBZ file parsing component, where the application fails to properly validate user-supplied pathnames before performing file operations. This improper limitation allows an attacker to craft a malicious CBZ archive containing specially named files that traverse directories outside the intended extraction path. When a user opens such a malicious CBZ file or visits a malicious page that triggers the file parsing, the attacker can execute arbitrary code within the context of the current user. The vulnerability requires user interaction but does not require prior authentication or elevated privileges. The CVSS v3.0 score is 7.8, indicating high severity with high impact on confidentiality, integrity, and availability. The attack vector is local (AV:L) but with low attack complexity (AC:L) and no privileges required (PR:N). The vulnerability was assigned by ZDI (ZDI-CAN-27509) and published on December 23, 2025. There are no known exploits in the wild at this time, and no official patches have been linked yet. The threat is significant because Soda PDF Desktop is widely used for PDF and CBZ file handling, and the ability to execute arbitrary code can lead to system compromise, data theft, or further lateral movement within networks.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially in sectors relying heavily on document processing and digital publishing, such as legal, finance, education, and media. Successful exploitation can lead to unauthorized disclosure of sensitive information, alteration or destruction of critical data, and disruption of business operations due to malware deployment or ransomware. Since the vulnerability requires user interaction, phishing or social engineering campaigns could be used to deliver malicious CBZ files, increasing the attack surface. Organizations with users who frequently handle CBZ files or receive documents from untrusted sources are particularly vulnerable. The impact extends to endpoint security, as compromised machines can serve as footholds for attackers to escalate privileges or move laterally within corporate networks. Additionally, the lack of a patch at the time of disclosure means organizations must rely on interim mitigations, increasing exposure duration. Given the high CVSS score and potential for remote code execution, the threat is critical to address promptly to prevent exploitation.

Mitigation Recommendations

1. Immediately restrict or disable the opening of CBZ files in Soda PDF Desktop until a vendor patch is released. 2. Educate users about the risks of opening CBZ files from untrusted or unknown sources and implement strict email filtering to block suspicious attachments. 3. Employ application whitelisting and endpoint detection and response (EDR) solutions to monitor and block unauthorized file operations and code execution attempts originating from Soda PDF processes. 4. Use sandboxing or isolated environments for opening untrusted CBZ files to contain potential exploitation. 5. Monitor network and endpoint logs for unusual activity related to Soda PDF Desktop, such as unexpected file writes outside normal directories. 6. Once available, promptly apply official patches or updates from Soda PDF to remediate the vulnerability. 7. Review and tighten user privileges to minimize the impact of code execution under user context. 8. Consider network segmentation to limit lateral movement if an endpoint is compromised. 9. Maintain up-to-date backups to recover from potential ransomware or destructive attacks stemming from exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
zdi
Date Reserved
2025-12-10T01:39:03.820Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 694b0a14d69af40f312b7df3

Added to database: 12/23/2025, 9:31:00 PM

Last enriched: 1/2/2026, 11:55:36 PM

Last updated: 2/7/2026, 7:14:38 AM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats