Skip to main content

CVE-2025-50422: CWE-617 Reachable Assertion in cairographics Cairo

Low
VulnerabilityCVE-2025-50422cvecve-2025-50422cwe-617
Published: Mon Aug 04 2025 (08/04/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: cairographics
Product: Cairo

Description

Cairo through 1.18.4, as used in Poppler through 25.08.0, has an "unscaled->face == NULL" assertion failure for _cairo_ft_unscaled_font_fini in cairo-ft-font.c.

AI-Powered Analysis

AILast updated: 08/27/2025, 00:42:13 UTC

Technical Analysis

CVE-2025-50422 is a low-severity vulnerability identified in the Cairo graphics library, specifically affecting versions through 1.18.4. Cairo is a widely used 2D graphics library that provides vector graphics rendering and is commonly integrated into various software projects, including Poppler, a PDF rendering library (up to version 25.08.0). The vulnerability is classified under CWE-617, which pertains to reachable assertions. In this case, the issue arises from an assertion failure triggered when the internal pointer 'unscaled->face' is NULL during the execution of the function _cairo_ft_unscaled_font_fini in the cairo-ft-font.c source file. This assertion failure leads to a program crash or denial of service (DoS) condition. The CVSS v3.1 base score is 2.9, indicating low severity, with the vector AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L. This means the attack requires local access (AV:L), high attack complexity (AC:H), no privileges (PR:N), no user interaction (UI:N), unchanged scope (S:U), and impacts only availability (A:L) without affecting confidentiality or integrity. No known exploits are reported in the wild, and no patches are currently linked. The vulnerability does not allow code execution or data manipulation but can cause application crashes when processing certain font data, potentially impacting software stability that relies on Cairo for font rendering.

Potential Impact

For European organizations, the primary impact of CVE-2025-50422 is limited to availability disruptions in applications that utilize the vulnerable versions of Cairo, particularly those that handle font rendering through Poppler or other dependent software. This could affect document viewers, PDF processing tools, or any graphical applications embedding Cairo. While the vulnerability does not compromise confidentiality or integrity, denial of service conditions could interrupt business operations, especially in environments where automated document processing or graphical rendering is critical. Given the local attack vector and high complexity, exploitation is unlikely remotely and would require an attacker to have local access to the system, reducing the risk in typical enterprise environments. However, in multi-user systems or shared environments, a malicious user could trigger crashes, potentially leading to service interruptions or system instability. The low severity and absence of known exploits further reduce immediate risk but do not eliminate the need for vigilance, especially in sectors relying heavily on document workflows or graphical rendering.

Mitigation Recommendations

To mitigate CVE-2025-50422, European organizations should: 1) Identify and inventory all software components and applications using Cairo graphics library versions up to 1.18.4 and Poppler up to 25.08.0. 2) Monitor vendor advisories and community repositories for patches or updates addressing this vulnerability and apply them promptly once available. 3) Restrict local access to systems running vulnerable software to trusted users only, minimizing the risk of local exploitation. 4) Implement application-level monitoring to detect crashes or abnormal terminations related to font rendering processes, enabling rapid incident response. 5) Where possible, consider upgrading to newer versions of Cairo and Poppler that may have resolved this issue or provide improved stability and security. 6) Employ sandboxing or containerization for applications processing untrusted documents to contain potential denial of service impacts. 7) Conduct regular security training to raise awareness about the risks of local exploits and the importance of maintaining updated software.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-06-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6890e42bad5a09ad00e252dd

Added to database: 8/4/2025, 4:47:39 PM

Last enriched: 8/27/2025, 12:42:13 AM

Last updated: 9/11/2025, 8:48:10 AM

Views: 35

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats