CVE-2025-54869: CWE-770: Allocation of Resources Without Limits or Throttling in Setasign FPDI
FPDI is a collection of PHP classes that facilitate reading pages from existing PDF documents and using them as templates in FPDF. In versions 2.6.2 and below, any application that uses FPDI to process user-supplied PDF files is at risk, causing a Denial of Service (DoS) vulnerability. An attacker can upload a small, malicious PDF file that will cause the server-side script to crash due to memory exhaustion. Repeated attacks can lead to sustained service unavailability. This issue is fixed in version 2.6.3.
AI Analysis
Technical Summary
CVE-2025-54869 is a Denial of Service (DoS) vulnerability affecting the Setasign FPDI PHP library, versions 2.6.2 and below. FPDI is widely used to read pages from existing PDF documents and reuse them as templates within the FPDF framework, commonly employed in web applications for PDF manipulation. The vulnerability arises due to improper resource allocation controls (CWE-770), where the library does not impose limits or throttling on memory usage when processing user-supplied PDF files. An attacker can exploit this by uploading a crafted malicious PDF file that triggers excessive memory consumption during processing, causing the server-side PHP script to crash or become unresponsive. This leads to service disruption and potential sustained unavailability if repeated attacks occur. The vulnerability requires low privileges (limited privileges) and no user interaction, with network attack vector, making it relatively easy to exploit remotely. The issue has been addressed in FPDI version 2.6.3, which implements proper resource management to prevent memory exhaustion. No known exploits are currently reported in the wild, but the medium CVSS 4.0 score of 6.0 reflects the moderate risk posed by this vulnerability, primarily impacting availability without compromising confidentiality or integrity.
Potential Impact
For European organizations, especially those relying on PHP-based web applications that utilize FPDI for PDF processing (e.g., document management systems, invoicing platforms, or content management systems), this vulnerability poses a risk of service disruption. Attackers could cause denial of service by sending malicious PDFs, leading to downtime, degraded user experience, and potential loss of business continuity. Organizations handling high volumes of PDF uploads or automated PDF processing are particularly vulnerable. The impact is more pronounced for public-facing services where attackers can easily submit malicious files. While confidentiality and integrity are not directly affected, the availability impact can disrupt critical workflows, compliance reporting, or customer-facing portals. This could indirectly affect regulatory compliance under GDPR if service unavailability impacts data subject rights or service commitments.
Mitigation Recommendations
1. Immediate upgrade of FPDI to version 2.6.3 or later to ensure the vulnerability is patched. 2. Implement strict input validation and file type verification to restrict PDF uploads to trusted sources and scan files for anomalies before processing. 3. Employ resource limits at the PHP runtime level, such as memory_limit and max_execution_time, to prevent excessive resource consumption from any single request. 4. Use sandboxing or isolated processing environments (e.g., containerization) for PDF processing to contain potential crashes and prevent impact on the entire application. 5. Monitor application logs and resource usage patterns to detect unusual spikes indicative of exploitation attempts. 6. Consider implementing rate limiting or CAPTCHA challenges on PDF upload endpoints to mitigate automated attack attempts. 7. Regularly review and update third-party dependencies to minimize exposure to known vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Austria
CVE-2025-54869: CWE-770: Allocation of Resources Without Limits or Throttling in Setasign FPDI
Description
FPDI is a collection of PHP classes that facilitate reading pages from existing PDF documents and using them as templates in FPDF. In versions 2.6.2 and below, any application that uses FPDI to process user-supplied PDF files is at risk, causing a Denial of Service (DoS) vulnerability. An attacker can upload a small, malicious PDF file that will cause the server-side script to crash due to memory exhaustion. Repeated attacks can lead to sustained service unavailability. This issue is fixed in version 2.6.3.
AI-Powered Analysis
Technical Analysis
CVE-2025-54869 is a Denial of Service (DoS) vulnerability affecting the Setasign FPDI PHP library, versions 2.6.2 and below. FPDI is widely used to read pages from existing PDF documents and reuse them as templates within the FPDF framework, commonly employed in web applications for PDF manipulation. The vulnerability arises due to improper resource allocation controls (CWE-770), where the library does not impose limits or throttling on memory usage when processing user-supplied PDF files. An attacker can exploit this by uploading a crafted malicious PDF file that triggers excessive memory consumption during processing, causing the server-side PHP script to crash or become unresponsive. This leads to service disruption and potential sustained unavailability if repeated attacks occur. The vulnerability requires low privileges (limited privileges) and no user interaction, with network attack vector, making it relatively easy to exploit remotely. The issue has been addressed in FPDI version 2.6.3, which implements proper resource management to prevent memory exhaustion. No known exploits are currently reported in the wild, but the medium CVSS 4.0 score of 6.0 reflects the moderate risk posed by this vulnerability, primarily impacting availability without compromising confidentiality or integrity.
Potential Impact
For European organizations, especially those relying on PHP-based web applications that utilize FPDI for PDF processing (e.g., document management systems, invoicing platforms, or content management systems), this vulnerability poses a risk of service disruption. Attackers could cause denial of service by sending malicious PDFs, leading to downtime, degraded user experience, and potential loss of business continuity. Organizations handling high volumes of PDF uploads or automated PDF processing are particularly vulnerable. The impact is more pronounced for public-facing services where attackers can easily submit malicious files. While confidentiality and integrity are not directly affected, the availability impact can disrupt critical workflows, compliance reporting, or customer-facing portals. This could indirectly affect regulatory compliance under GDPR if service unavailability impacts data subject rights or service commitments.
Mitigation Recommendations
1. Immediate upgrade of FPDI to version 2.6.3 or later to ensure the vulnerability is patched. 2. Implement strict input validation and file type verification to restrict PDF uploads to trusted sources and scan files for anomalies before processing. 3. Employ resource limits at the PHP runtime level, such as memory_limit and max_execution_time, to prevent excessive resource consumption from any single request. 4. Use sandboxing or isolated processing environments (e.g., containerization) for PDF processing to contain potential crashes and prevent impact on the entire application. 5. Monitor application logs and resource usage patterns to detect unusual spikes indicative of exploitation attempts. 6. Consider implementing rate limiting or CAPTCHA challenges on PDF upload endpoints to mitigate automated attack attempts. 7. Regularly review and update third-party dependencies to minimize exposure to known vulnerabilities.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-07-31T17:23:33.473Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68929821ad5a09ad00ec5adf
Added to database: 8/5/2025, 11:47:45 PM
Last enriched: 8/13/2025, 1:01:48 AM
Last updated: 11/4/2025, 12:23:26 PM
Views: 76
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11690: CWE-639 Authorization Bypass Through User-Controlled Key in CFMOTO RIDE
HighCVE-2025-12493: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in devitemsllc ShopLentor – WooCommerce Builder for Elementor & Gutenberg +21 Modules – All in One Solution (formerly WooLentor)
CriticalCVE-2025-12045: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in themeisle Orbit Fox: Duplicate Page, Menu Icons, SVG Support, Cookie Notice, Custom Fonts & More
MediumCVE-2025-20749: CWE-121 Stack Overflow in MediaTek, Inc. MT6789, MT6835, MT6855, MT6878, MT6879, MT6886, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8169, MT8188, MT8195, MT8196, MT8781, MT8796
UnknownCVE-2025-20748: CWE-120 Classic Buffer Overflow in MediaTek, Inc. MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.