Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43718: CWE-674 Uncontrolled Recursion in freedesktop Poppler

0
Low
VulnerabilityCVE-2025-43718cvecve-2025-43718cwe-674
Published: Wed Oct 01 2025 (10/01/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: freedesktop
Product: Poppler

Description

Poppler 24.06.1 through 25.x before 25.04.0 allows stack consumption and a SIGSEGV via deeply nested structures within the metadata (such as GTS_PDFEVersion) of a PDF document, e.g., a regular expression for a long pdfsubver string. This occurs in Dict::lookup, Catalog::getMetadata, and associated functions in PDFDoc, with deep recursion in the regex executor (std::__detail::_Executor).

AI-Powered Analysis

AILast updated: 10/08/2025, 19:30:00 UTC

Technical Analysis

CVE-2025-43718 is a vulnerability in the freedesktop Poppler PDF rendering library, specifically affecting versions 24.06.1 through versions prior to 25.04.0. The issue stems from uncontrolled recursion when parsing deeply nested metadata structures within PDF documents, such as the GTS_PDFEVersion field or long pdfsubver strings that are processed using regular expressions. The recursion occurs in functions like Dict::lookup, Catalog::getMetadata, and the regex executor component std::__detail::_Executor within the PDFDoc class. When a maliciously crafted PDF with deeply nested metadata is processed, the recursion depth can cause excessive stack consumption, leading to a stack overflow and a segmentation fault (SIGSEGV). This results in a denial-of-service condition by crashing the application using Poppler to parse the PDF. The CVSS score is 2.9, indicating low severity, with an attack vector limited to local access (AV:L), high attack complexity (AC:H), no privileges required (PR:N), and no user interaction (UI:N). The vulnerability does not impact confidentiality or integrity, only availability. No public exploits or active exploitation in the wild have been reported. The root cause is classified under CWE-674 (Uncontrolled Recursion). The vulnerability highlights the risk of insufficient input validation and recursion control in PDF metadata parsing, which can be exploited to disrupt services relying on Poppler for PDF rendering or processing. No official patches were linked at the time of publication, but upgrading to Poppler 25.04.0 or later is expected to resolve the issue.

Potential Impact

For European organizations, the primary impact of CVE-2025-43718 is the potential for denial-of-service (DoS) conditions in applications or services that utilize vulnerable versions of Poppler for PDF rendering or processing. This could affect document management systems, email clients, web services, or any software that automatically processes PDF files. While the vulnerability does not compromise data confidentiality or integrity, service disruptions could impact business continuity, especially in sectors heavily reliant on automated PDF workflows such as legal, finance, and government. The requirement for local access and high attack complexity limits remote exploitation, reducing the risk of widespread attacks. However, insider threats or compromised internal systems could leverage this vulnerability to cause application crashes. Organizations with automated PDF ingestion pipelines or public-facing services that accept PDF uploads should be particularly cautious. The lack of known exploits reduces immediate risk, but the vulnerability should be addressed proactively to avoid future exploitation. Overall, the impact is moderate in terms of availability disruption but limited in scope and severity.

Mitigation Recommendations

1. Upgrade Poppler to version 25.04.0 or later as soon as the patch becomes available to eliminate the uncontrolled recursion issue. 2. Implement input validation and sanitization on PDF metadata before processing to detect and reject suspiciously deeply nested or malformed PDFs. 3. Employ sandboxing or containerization for PDF processing components to isolate crashes and prevent service-wide impact. 4. Monitor application logs for repeated crashes or segmentation faults related to PDF parsing to detect potential exploitation attempts. 5. Limit local access to systems performing PDF processing to trusted users and services to reduce the attack surface. 6. Consider rate limiting or scanning PDF uploads in public-facing services to mitigate the risk of malicious PDFs triggering the vulnerability. 7. Maintain up-to-date backups and incident response plans to quickly recover from denial-of-service incidents. 8. Engage with software vendors or open-source communities to track patch releases and security advisories related to Poppler.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-17T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68dd7b129f41f345b1268044

Added to database: 10/1/2025, 7:03:46 PM

Last enriched: 10/8/2025, 7:30:00 PM

Last updated: 11/15/2025, 8:32:32 AM

Views: 101

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats