CVE-2025-54869: CWE-770: Allocation of Resources Without Limits or Throttling in Setasign FPDI
FPDI is a collection of PHP classes that facilitate reading pages from existing PDF documents and using them as templates in FPDF. In versions 2.6.2 and below, any application that uses FPDI to process user-supplied PDF files is at risk, causing a Denial of Service (DoS) vulnerability. An attacker can upload a small, malicious PDF file that will cause the server-side script to crash due to memory exhaustion. Repeated attacks can lead to sustained service unavailability. This issue is fixed in version 2.6.3.
AI Analysis
Technical Summary
CVE-2025-54869 is a Denial of Service (DoS) vulnerability affecting the Setasign FPDI PHP library, versions 2.6.2 and below. FPDI is widely used to read pages from existing PDF documents and reuse them as templates within the FPDF framework, commonly employed in web applications for PDF manipulation. The vulnerability arises due to improper resource allocation controls (CWE-770), where the library does not impose limits or throttling on memory usage when processing user-supplied PDF files. An attacker can exploit this by uploading a crafted malicious PDF file that triggers excessive memory consumption during processing, causing the server-side PHP script to crash or become unresponsive. This leads to service disruption and potential sustained unavailability if repeated attacks occur. The vulnerability requires low privileges (limited privileges) and no user interaction, with network attack vector, making it relatively easy to exploit remotely. The issue has been addressed in FPDI version 2.6.3, which implements proper resource management to prevent memory exhaustion. No known exploits are currently reported in the wild, but the medium CVSS 4.0 score of 6.0 reflects the moderate risk posed by this vulnerability, primarily impacting availability without compromising confidentiality or integrity.
Potential Impact
For European organizations, especially those relying on PHP-based web applications that utilize FPDI for PDF processing (e.g., document management systems, invoicing platforms, or content management systems), this vulnerability poses a risk of service disruption. Attackers could cause denial of service by sending malicious PDFs, leading to downtime, degraded user experience, and potential loss of business continuity. Organizations handling high volumes of PDF uploads or automated PDF processing are particularly vulnerable. The impact is more pronounced for public-facing services where attackers can easily submit malicious files. While confidentiality and integrity are not directly affected, the availability impact can disrupt critical workflows, compliance reporting, or customer-facing portals. This could indirectly affect regulatory compliance under GDPR if service unavailability impacts data subject rights or service commitments.
Mitigation Recommendations
1. Immediate upgrade of FPDI to version 2.6.3 or later to ensure the vulnerability is patched. 2. Implement strict input validation and file type verification to restrict PDF uploads to trusted sources and scan files for anomalies before processing. 3. Employ resource limits at the PHP runtime level, such as memory_limit and max_execution_time, to prevent excessive resource consumption from any single request. 4. Use sandboxing or isolated processing environments (e.g., containerization) for PDF processing to contain potential crashes and prevent impact on the entire application. 5. Monitor application logs and resource usage patterns to detect unusual spikes indicative of exploitation attempts. 6. Consider implementing rate limiting or CAPTCHA challenges on PDF upload endpoints to mitigate automated attack attempts. 7. Regularly review and update third-party dependencies to minimize exposure to known vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Austria
CVE-2025-54869: CWE-770: Allocation of Resources Without Limits or Throttling in Setasign FPDI
Description
FPDI is a collection of PHP classes that facilitate reading pages from existing PDF documents and using them as templates in FPDF. In versions 2.6.2 and below, any application that uses FPDI to process user-supplied PDF files is at risk, causing a Denial of Service (DoS) vulnerability. An attacker can upload a small, malicious PDF file that will cause the server-side script to crash due to memory exhaustion. Repeated attacks can lead to sustained service unavailability. This issue is fixed in version 2.6.3.
AI-Powered Analysis
Technical Analysis
CVE-2025-54869 is a Denial of Service (DoS) vulnerability affecting the Setasign FPDI PHP library, versions 2.6.2 and below. FPDI is widely used to read pages from existing PDF documents and reuse them as templates within the FPDF framework, commonly employed in web applications for PDF manipulation. The vulnerability arises due to improper resource allocation controls (CWE-770), where the library does not impose limits or throttling on memory usage when processing user-supplied PDF files. An attacker can exploit this by uploading a crafted malicious PDF file that triggers excessive memory consumption during processing, causing the server-side PHP script to crash or become unresponsive. This leads to service disruption and potential sustained unavailability if repeated attacks occur. The vulnerability requires low privileges (limited privileges) and no user interaction, with network attack vector, making it relatively easy to exploit remotely. The issue has been addressed in FPDI version 2.6.3, which implements proper resource management to prevent memory exhaustion. No known exploits are currently reported in the wild, but the medium CVSS 4.0 score of 6.0 reflects the moderate risk posed by this vulnerability, primarily impacting availability without compromising confidentiality or integrity.
Potential Impact
For European organizations, especially those relying on PHP-based web applications that utilize FPDI for PDF processing (e.g., document management systems, invoicing platforms, or content management systems), this vulnerability poses a risk of service disruption. Attackers could cause denial of service by sending malicious PDFs, leading to downtime, degraded user experience, and potential loss of business continuity. Organizations handling high volumes of PDF uploads or automated PDF processing are particularly vulnerable. The impact is more pronounced for public-facing services where attackers can easily submit malicious files. While confidentiality and integrity are not directly affected, the availability impact can disrupt critical workflows, compliance reporting, or customer-facing portals. This could indirectly affect regulatory compliance under GDPR if service unavailability impacts data subject rights or service commitments.
Mitigation Recommendations
1. Immediate upgrade of FPDI to version 2.6.3 or later to ensure the vulnerability is patched. 2. Implement strict input validation and file type verification to restrict PDF uploads to trusted sources and scan files for anomalies before processing. 3. Employ resource limits at the PHP runtime level, such as memory_limit and max_execution_time, to prevent excessive resource consumption from any single request. 4. Use sandboxing or isolated processing environments (e.g., containerization) for PDF processing to contain potential crashes and prevent impact on the entire application. 5. Monitor application logs and resource usage patterns to detect unusual spikes indicative of exploitation attempts. 6. Consider implementing rate limiting or CAPTCHA challenges on PDF upload endpoints to mitigate automated attack attempts. 7. Regularly review and update third-party dependencies to minimize exposure to known vulnerabilities.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-07-31T17:23:33.473Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68929821ad5a09ad00ec5adf
Added to database: 8/5/2025, 11:47:45 PM
Last enriched: 8/13/2025, 1:01:48 AM
Last updated: 9/17/2025, 7:11:02 PM
Views: 41
Related Threats
CVE-2025-7403: Write-what-where Condition in zephyrproject-rtos Zephyr
HighCVE-2025-10458: Improper Handling of Length Parameter Inconsistency in zephyrproject-rtos Zephyr
HighCVE-2025-10457: Improperly Implemented Security Check for Standard in zephyrproject-rtos Zephyr
MediumCVE-2025-8487: CWE-862 Missing Authorization in extendthemes Kubio AI Page Builder
MediumCVE-2025-59717: CWE-843 Access of Resource Using Incompatible Type ('Type Confusion') in DigitalOcean @digitalocean/do-markdownit
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.