CVE-2025-43718: CWE-674 Uncontrolled Recursion in freedesktop Poppler
Poppler 24.06.1 through 25.x before 25.04.0 allows stack consumption and a SIGSEGV via deeply nested structures within the metadata (such as GTS_PDFEVersion) of a PDF document, e.g., a regular expression for a long pdfsubver string. This occurs in Dict::lookup, Catalog::getMetadata, and associated functions in PDFDoc, with deep recursion in the regex executor (std::__detail::_Executor).
AI Analysis
Technical Summary
CVE-2025-43718 is a vulnerability in the freedesktop Poppler PDF rendering library, specifically affecting versions 24.06.1 through versions prior to 25.04.0. The issue stems from uncontrolled recursion when parsing deeply nested metadata structures within PDF documents, such as the GTS_PDFEVersion field or long pdfsubver strings that are processed using regular expressions. The recursion occurs in functions like Dict::lookup, Catalog::getMetadata, and the regex executor component std::__detail::_Executor within the PDFDoc class. When a maliciously crafted PDF with deeply nested metadata is processed, the recursion depth can cause excessive stack consumption, leading to a stack overflow and a segmentation fault (SIGSEGV). This results in a denial-of-service condition by crashing the application using Poppler to parse the PDF. The CVSS score is 2.9, indicating low severity, with an attack vector limited to local access (AV:L), high attack complexity (AC:H), no privileges required (PR:N), and no user interaction (UI:N). The vulnerability does not impact confidentiality or integrity, only availability. No public exploits or active exploitation in the wild have been reported. The root cause is classified under CWE-674 (Uncontrolled Recursion). The vulnerability highlights the risk of insufficient input validation and recursion control in PDF metadata parsing, which can be exploited to disrupt services relying on Poppler for PDF rendering or processing. No official patches were linked at the time of publication, but upgrading to Poppler 25.04.0 or later is expected to resolve the issue.
Potential Impact
For European organizations, the primary impact of CVE-2025-43718 is the potential for denial-of-service (DoS) conditions in applications or services that utilize vulnerable versions of Poppler for PDF rendering or processing. This could affect document management systems, email clients, web services, or any software that automatically processes PDF files. While the vulnerability does not compromise data confidentiality or integrity, service disruptions could impact business continuity, especially in sectors heavily reliant on automated PDF workflows such as legal, finance, and government. The requirement for local access and high attack complexity limits remote exploitation, reducing the risk of widespread attacks. However, insider threats or compromised internal systems could leverage this vulnerability to cause application crashes. Organizations with automated PDF ingestion pipelines or public-facing services that accept PDF uploads should be particularly cautious. The lack of known exploits reduces immediate risk, but the vulnerability should be addressed proactively to avoid future exploitation. Overall, the impact is moderate in terms of availability disruption but limited in scope and severity.
Mitigation Recommendations
1. Upgrade Poppler to version 25.04.0 or later as soon as the patch becomes available to eliminate the uncontrolled recursion issue. 2. Implement input validation and sanitization on PDF metadata before processing to detect and reject suspiciously deeply nested or malformed PDFs. 3. Employ sandboxing or containerization for PDF processing components to isolate crashes and prevent service-wide impact. 4. Monitor application logs for repeated crashes or segmentation faults related to PDF parsing to detect potential exploitation attempts. 5. Limit local access to systems performing PDF processing to trusted users and services to reduce the attack surface. 6. Consider rate limiting or scanning PDF uploads in public-facing services to mitigate the risk of malicious PDFs triggering the vulnerability. 7. Maintain up-to-date backups and incident response plans to quickly recover from denial-of-service incidents. 8. Engage with software vendors or open-source communities to track patch releases and security advisories related to Poppler.
Affected Countries
Germany, France, Netherlands, United Kingdom, Sweden
CVE-2025-43718: CWE-674 Uncontrolled Recursion in freedesktop Poppler
Description
Poppler 24.06.1 through 25.x before 25.04.0 allows stack consumption and a SIGSEGV via deeply nested structures within the metadata (such as GTS_PDFEVersion) of a PDF document, e.g., a regular expression for a long pdfsubver string. This occurs in Dict::lookup, Catalog::getMetadata, and associated functions in PDFDoc, with deep recursion in the regex executor (std::__detail::_Executor).
AI-Powered Analysis
Technical Analysis
CVE-2025-43718 is a vulnerability in the freedesktop Poppler PDF rendering library, specifically affecting versions 24.06.1 through versions prior to 25.04.0. The issue stems from uncontrolled recursion when parsing deeply nested metadata structures within PDF documents, such as the GTS_PDFEVersion field or long pdfsubver strings that are processed using regular expressions. The recursion occurs in functions like Dict::lookup, Catalog::getMetadata, and the regex executor component std::__detail::_Executor within the PDFDoc class. When a maliciously crafted PDF with deeply nested metadata is processed, the recursion depth can cause excessive stack consumption, leading to a stack overflow and a segmentation fault (SIGSEGV). This results in a denial-of-service condition by crashing the application using Poppler to parse the PDF. The CVSS score is 2.9, indicating low severity, with an attack vector limited to local access (AV:L), high attack complexity (AC:H), no privileges required (PR:N), and no user interaction (UI:N). The vulnerability does not impact confidentiality or integrity, only availability. No public exploits or active exploitation in the wild have been reported. The root cause is classified under CWE-674 (Uncontrolled Recursion). The vulnerability highlights the risk of insufficient input validation and recursion control in PDF metadata parsing, which can be exploited to disrupt services relying on Poppler for PDF rendering or processing. No official patches were linked at the time of publication, but upgrading to Poppler 25.04.0 or later is expected to resolve the issue.
Potential Impact
For European organizations, the primary impact of CVE-2025-43718 is the potential for denial-of-service (DoS) conditions in applications or services that utilize vulnerable versions of Poppler for PDF rendering or processing. This could affect document management systems, email clients, web services, or any software that automatically processes PDF files. While the vulnerability does not compromise data confidentiality or integrity, service disruptions could impact business continuity, especially in sectors heavily reliant on automated PDF workflows such as legal, finance, and government. The requirement for local access and high attack complexity limits remote exploitation, reducing the risk of widespread attacks. However, insider threats or compromised internal systems could leverage this vulnerability to cause application crashes. Organizations with automated PDF ingestion pipelines or public-facing services that accept PDF uploads should be particularly cautious. The lack of known exploits reduces immediate risk, but the vulnerability should be addressed proactively to avoid future exploitation. Overall, the impact is moderate in terms of availability disruption but limited in scope and severity.
Mitigation Recommendations
1. Upgrade Poppler to version 25.04.0 or later as soon as the patch becomes available to eliminate the uncontrolled recursion issue. 2. Implement input validation and sanitization on PDF metadata before processing to detect and reject suspiciously deeply nested or malformed PDFs. 3. Employ sandboxing or containerization for PDF processing components to isolate crashes and prevent service-wide impact. 4. Monitor application logs for repeated crashes or segmentation faults related to PDF parsing to detect potential exploitation attempts. 5. Limit local access to systems performing PDF processing to trusted users and services to reduce the attack surface. 6. Consider rate limiting or scanning PDF uploads in public-facing services to mitigate the risk of malicious PDFs triggering the vulnerability. 7. Maintain up-to-date backups and incident response plans to quickly recover from denial-of-service incidents. 8. Engage with software vendors or open-source communities to track patch releases and security advisories related to Poppler.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-04-17T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68dd7b129f41f345b1268044
Added to database: 10/1/2025, 7:03:46 PM
Last enriched: 10/8/2025, 7:30:00 PM
Last updated: 11/15/2025, 8:32:32 AM
Views: 101
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13191: Stack-based Buffer Overflow in D-Link DIR-816L
HighCVE-2025-12849: CWE-862 Missing Authorization in contest-gallery Contest Gallery – Upload, Vote & Sell with PayPal and Stripe
MediumCVE-2025-13190: Stack-based Buffer Overflow in D-Link DIR-816L
HighCVE-2025-13189: Stack-based Buffer Overflow in D-Link DIR-816L
HighCVE-2025-8994: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in wedevs Project Management & Task Manager with Kanban Board & Gantt Chart – WP Project Manager
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.