CVE-2025-15569: Uncontrolled Search Path in Artifex MuPDF
A flaw has been found in Artifex MuPDF up to 1.26.1 on Windows. The impacted element is the function get_system_dpi of the file platform/x11/win_main.c. This manipulation causes uncontrolled search path. The attack requires local access. The attack is considered to have high complexity. The exploitability is regarded as difficult. Upgrading to version 1.26.2 is sufficient to resolve this issue. Patch name: ebb125334eb007d64e579204af3c264aadf2e244. Upgrading the affected component is recommended.
AI Analysis
Technical Summary
CVE-2025-15569 is a vulnerability identified in the Artifex MuPDF library, specifically affecting versions 1.26.0 and 1.26.1 on Windows platforms. The issue resides in the get_system_dpi function located in platform/x11/win_main.c, where an uncontrolled search path allows an attacker with local access to influence which files or libraries are loaded or executed. This vulnerability arises from improper handling of system DPI retrieval, leading to potential path manipulation. The attack complexity is high, meaning exploitation requires significant skill or conditions, and no user interaction is needed. The vulnerability does not require elevated privileges but does require local access, limiting remote exploitation. The CVSS 4.0 score is 7.3 (high severity), reflecting the potential for significant confidentiality, integrity, and availability impacts if exploited. The vendor has released version 1.26.2 with a patch (commit ebb125334eb007d64e579204af3c264aadf2e244) that corrects the search path handling, effectively mitigating the vulnerability. No known exploits have been reported in the wild, but the flaw could be leveraged for local privilege escalation or code execution if an attacker gains access to a vulnerable system.
Potential Impact
If exploited, this vulnerability could allow a local attacker to execute arbitrary code or escalate privileges by manipulating the search path used by the MuPDF application. This could lead to unauthorized access to sensitive information, modification or corruption of data, or disruption of service. Organizations relying on MuPDF for document rendering or processing on Windows systems may face risks of local compromise, particularly in environments where multiple users share systems or where local access controls are weak. Although remote exploitation is not feasible, insider threats or attackers with initial footholds could leverage this vulnerability to deepen access. The high complexity and lack of known exploits reduce immediate risk, but the potential impact on confidentiality, integrity, and availability remains significant, especially in sensitive or high-security environments.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade all affected MuPDF instances to version 1.26.2 or later, which contains the official patch correcting the uncontrolled search path issue. Additionally, enforce strict local access controls and user permissions to limit who can execute or interact with MuPDF binaries. Implement application whitelisting to prevent unauthorized code execution and monitor systems for unusual local activity that could indicate exploitation attempts. Regularly audit and harden the environment to reduce the risk of local privilege escalation. Where possible, isolate MuPDF usage to trusted environments and consider employing endpoint detection and response (EDR) tools to detect suspicious behaviors related to DLL or path manipulation. Finally, maintain up-to-date inventories of software versions to ensure timely patch management.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, Canada, Australia, Netherlands, Sweden
CVE-2025-15569: Uncontrolled Search Path in Artifex MuPDF
Description
A flaw has been found in Artifex MuPDF up to 1.26.1 on Windows. The impacted element is the function get_system_dpi of the file platform/x11/win_main.c. This manipulation causes uncontrolled search path. The attack requires local access. The attack is considered to have high complexity. The exploitability is regarded as difficult. Upgrading to version 1.26.2 is sufficient to resolve this issue. Patch name: ebb125334eb007d64e579204af3c264aadf2e244. Upgrading the affected component is recommended.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-15569 is a vulnerability identified in the Artifex MuPDF library, specifically affecting versions 1.26.0 and 1.26.1 on Windows platforms. The issue resides in the get_system_dpi function located in platform/x11/win_main.c, where an uncontrolled search path allows an attacker with local access to influence which files or libraries are loaded or executed. This vulnerability arises from improper handling of system DPI retrieval, leading to potential path manipulation. The attack complexity is high, meaning exploitation requires significant skill or conditions, and no user interaction is needed. The vulnerability does not require elevated privileges but does require local access, limiting remote exploitation. The CVSS 4.0 score is 7.3 (high severity), reflecting the potential for significant confidentiality, integrity, and availability impacts if exploited. The vendor has released version 1.26.2 with a patch (commit ebb125334eb007d64e579204af3c264aadf2e244) that corrects the search path handling, effectively mitigating the vulnerability. No known exploits have been reported in the wild, but the flaw could be leveraged for local privilege escalation or code execution if an attacker gains access to a vulnerable system.
Potential Impact
If exploited, this vulnerability could allow a local attacker to execute arbitrary code or escalate privileges by manipulating the search path used by the MuPDF application. This could lead to unauthorized access to sensitive information, modification or corruption of data, or disruption of service. Organizations relying on MuPDF for document rendering or processing on Windows systems may face risks of local compromise, particularly in environments where multiple users share systems or where local access controls are weak. Although remote exploitation is not feasible, insider threats or attackers with initial footholds could leverage this vulnerability to deepen access. The high complexity and lack of known exploits reduce immediate risk, but the potential impact on confidentiality, integrity, and availability remains significant, especially in sensitive or high-security environments.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade all affected MuPDF instances to version 1.26.2 or later, which contains the official patch correcting the uncontrolled search path issue. Additionally, enforce strict local access controls and user permissions to limit who can execute or interact with MuPDF binaries. Implement application whitelisting to prevent unauthorized code execution and monitor systems for unusual local activity that could indicate exploitation attempts. Regularly audit and harden the environment to reduce the risk of local privilege escalation. Where possible, isolate MuPDF usage to trusted environments and consider employing endpoint detection and response (EDR) tools to detect suspicious behaviors related to DLL or path manipulation. Finally, maintain up-to-date inventories of software versions to ensure timely patch management.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-08T08:06:04.188Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698b08f34b57a58fa1fbed10
Added to database: 2/10/2026, 10:31:15 AM
Last enriched: 2/23/2026, 9:03:12 PM
Last updated: 3/27/2026, 9:22:10 PM
Views: 98
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.