CVE-2025-48188: CWE-125 Out-of-bounds Read in GNU PSPP
libpspp-core.a in GNU PSPP through 2.0.1 has an incorrect call from fill_buffer (in data/encrypted-file.c) to the Gnulib rijndaelDecrypt function, leading to a heap-based buffer over-read.
AI Analysis
Technical Summary
CVE-2025-48188 is a vulnerability identified in GNU PSPP, an open-source statistical analysis software often used as a free alternative to proprietary tools like SPSS. The issue lies within the libpspp-core.a library, specifically in the fill_buffer function located in data/encrypted-file.c. This function incorrectly calls the Gnulib rijndaelDecrypt function, which leads to a heap-based buffer over-read, classified under CWE-125 (Out-of-bounds Read). A buffer over-read occurs when a program reads data beyond the allocated memory buffer, potentially causing application crashes or exposing sensitive data from adjacent memory. However, in this case, the vulnerability is characterized as low severity with a CVSS 3.1 score of 2.9, indicating limited impact. The attack vector is local (AV:L), requiring high attack complexity (AC:H), no privileges (PR:N), and no user interaction (UI:N). The scope is unchanged (S:U), and the impact affects availability only (A:L) without compromising confidentiality or integrity. There are no known exploits in the wild, and no patches have been linked yet. This suggests the vulnerability is not currently actively exploited and may require specific conditions or expertise to trigger. The flaw could cause PSPP to crash or behave unpredictably when processing encrypted files, potentially disrupting statistical analysis workflows. Since PSPP is used primarily in academic, research, and some governmental contexts, the vulnerability's impact is mostly limited to availability disruptions rather than data breaches or privilege escalations.
Potential Impact
For European organizations, the impact of CVE-2025-48188 is expected to be minimal due to the low severity and local attack vector. Organizations using GNU PSPP for statistical analysis might experience application crashes or denial of service when handling certain encrypted data files, which could interrupt research or data processing tasks. However, the lack of confidentiality or integrity impact means sensitive data exposure or manipulation is unlikely. The requirement for local access and high attack complexity reduces the risk of remote exploitation or widespread attacks. Nonetheless, organizations relying heavily on PSPP for critical data analysis should be aware of potential availability issues, especially in academic institutions, research centers, and public sector agencies where PSPP usage is more common. The vulnerability does not pose a direct threat to network infrastructure or critical systems but could cause operational inconvenience and require troubleshooting or temporary workarounds until a patch is available.
Mitigation Recommendations
To mitigate the risk posed by CVE-2025-48188, European organizations should: 1) Restrict local access to systems running GNU PSPP to trusted users only, minimizing the risk of unauthorized local exploitation. 2) Monitor PSPP usage and logs for unusual crashes or errors related to encrypted file processing to detect potential exploitation attempts. 3) Avoid processing untrusted or malformed encrypted files with PSPP until a patch or update addressing the vulnerability is released. 4) Engage with the GNU PSPP community or maintainers to track the release of security patches and apply updates promptly once available. 5) Consider implementing application whitelisting and endpoint protection controls to prevent execution of unauthorized code or manipulation of PSPP binaries. 6) For critical environments, evaluate alternative statistical analysis tools temporarily if PSPP stability is compromised. These steps go beyond generic advice by focusing on access control, monitoring, and cautious handling of encrypted data files specific to this vulnerability's characteristics.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy, Spain, Poland
CVE-2025-48188: CWE-125 Out-of-bounds Read in GNU PSPP
Description
libpspp-core.a in GNU PSPP through 2.0.1 has an incorrect call from fill_buffer (in data/encrypted-file.c) to the Gnulib rijndaelDecrypt function, leading to a heap-based buffer over-read.
AI-Powered Analysis
Technical Analysis
CVE-2025-48188 is a vulnerability identified in GNU PSPP, an open-source statistical analysis software often used as a free alternative to proprietary tools like SPSS. The issue lies within the libpspp-core.a library, specifically in the fill_buffer function located in data/encrypted-file.c. This function incorrectly calls the Gnulib rijndaelDecrypt function, which leads to a heap-based buffer over-read, classified under CWE-125 (Out-of-bounds Read). A buffer over-read occurs when a program reads data beyond the allocated memory buffer, potentially causing application crashes or exposing sensitive data from adjacent memory. However, in this case, the vulnerability is characterized as low severity with a CVSS 3.1 score of 2.9, indicating limited impact. The attack vector is local (AV:L), requiring high attack complexity (AC:H), no privileges (PR:N), and no user interaction (UI:N). The scope is unchanged (S:U), and the impact affects availability only (A:L) without compromising confidentiality or integrity. There are no known exploits in the wild, and no patches have been linked yet. This suggests the vulnerability is not currently actively exploited and may require specific conditions or expertise to trigger. The flaw could cause PSPP to crash or behave unpredictably when processing encrypted files, potentially disrupting statistical analysis workflows. Since PSPP is used primarily in academic, research, and some governmental contexts, the vulnerability's impact is mostly limited to availability disruptions rather than data breaches or privilege escalations.
Potential Impact
For European organizations, the impact of CVE-2025-48188 is expected to be minimal due to the low severity and local attack vector. Organizations using GNU PSPP for statistical analysis might experience application crashes or denial of service when handling certain encrypted data files, which could interrupt research or data processing tasks. However, the lack of confidentiality or integrity impact means sensitive data exposure or manipulation is unlikely. The requirement for local access and high attack complexity reduces the risk of remote exploitation or widespread attacks. Nonetheless, organizations relying heavily on PSPP for critical data analysis should be aware of potential availability issues, especially in academic institutions, research centers, and public sector agencies where PSPP usage is more common. The vulnerability does not pose a direct threat to network infrastructure or critical systems but could cause operational inconvenience and require troubleshooting or temporary workarounds until a patch is available.
Mitigation Recommendations
To mitigate the risk posed by CVE-2025-48188, European organizations should: 1) Restrict local access to systems running GNU PSPP to trusted users only, minimizing the risk of unauthorized local exploitation. 2) Monitor PSPP usage and logs for unusual crashes or errors related to encrypted file processing to detect potential exploitation attempts. 3) Avoid processing untrusted or malformed encrypted files with PSPP until a patch or update addressing the vulnerability is released. 4) Engage with the GNU PSPP community or maintainers to track the release of security patches and apply updates promptly once available. 5) Consider implementing application whitelisting and endpoint protection controls to prevent execution of unauthorized code or manipulation of PSPP binaries. 6) For critical environments, evaluate alternative statistical analysis tools temporarily if PSPP stability is compromised. These steps go beyond generic advice by focusing on access control, monitoring, and cautious handling of encrypted data files specific to this vulnerability's characteristics.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-05-16T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aeba38
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 7/11/2025, 9:18:10 PM
Last updated: 10/7/2025, 1:48:29 PM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11396: SQL Injection in code-projects Simple Food Ordering System
MediumCVE-2025-40889: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Nozomi Networks Guardian
HighCVE-2025-40888: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40887: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40886: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.