Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54988: CWE-611 Improper Restriction of XML External Entity Reference in Apache Software Foundation Apache Tika PDF parser module

0
High
VulnerabilityCVE-2025-54988cvecve-2025-54988cwe-611
Published: Wed Aug 20 2025 (08/20/2025, 20:08:49 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Tika PDF parser module

Description

Critical XXE in Apache Tika (tika-parser-pdf-module) in Apache Tika 1.13 through and including 3.2.1 on all platforms allows an attacker to carry out XML External Entity injection via a crafted XFA file inside of a PDF. An attacker may be able to read sensitive data or trigger malicious requests to internal resources or third-party servers. Note that the tika-parser-pdf-module is used as a dependency in several Tika packages including at least: tika-parsers-standard-modules, tika-parsers-standard-package, tika-app, tika-grpc and tika-server-standard. Users are recommended to upgrade to version 3.2.2, which fixes this issue.

AI-Powered Analysis

AILast updated: 01/22/2026, 20:06:24 UTC

Technical Analysis

CVE-2025-54988 is an XML External Entity (XXE) vulnerability classified under CWE-611, found in the Apache Tika PDF parser module versions 1.13 through 3.2.1. Apache Tika is a widely used content analysis toolkit that extracts metadata and text from various document formats, including PDFs. The vulnerability arises from improper restriction of XML external entity references within the XFA (XML Forms Architecture) files embedded inside PDF documents. An attacker can craft a malicious PDF containing a specially designed XFA file that triggers the XXE flaw when parsed by the vulnerable Tika module. This can lead to unauthorized disclosure of sensitive information by reading local files or internal resources, or it can be used to initiate malicious requests to internal networks or external third-party servers, potentially facilitating further attacks such as SSRF (Server-Side Request Forgery). The vulnerability does not require authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 8.4, indicating high severity with impacts on confidentiality, integrity, and availability. The vulnerable module is a dependency in several Apache Tika packages, including tika-parsers-standard-modules, tika-parsers-standard-package, tika-app, tika-grpc, and tika-server-standard, broadening the scope of affected systems. No known exploits are currently reported in the wild, but the critical nature of the flaw necessitates prompt remediation. The Apache Software Foundation has released version 3.2.2 of Apache Tika, which addresses this vulnerability by properly restricting XML external entity processing in the PDF parser module.

Potential Impact

For European organizations, the impact of CVE-2025-54988 can be significant, especially for those relying on Apache Tika for document processing, content extraction, or indexing services. Sensitive sectors such as finance, healthcare, government, and legal services often process large volumes of PDF documents and may use Apache Tika as part of their data ingestion pipelines. Exploitation of this vulnerability could lead to unauthorized disclosure of confidential information, including internal documents, credentials, or personally identifiable information (PII). Additionally, the ability to trigger requests to internal or external systems could facilitate lateral movement within networks or enable further attacks such as data exfiltration or denial of service. The vulnerability’s ease of exploitation without authentication or user interaction increases the risk of automated or targeted attacks. Disruption of document processing services could also affect business continuity and compliance with data protection regulations such as GDPR. Organizations using Apache Tika in cloud environments or exposed services may face increased exposure to remote exploitation attempts.

Mitigation Recommendations

To mitigate CVE-2025-54988, European organizations should prioritize upgrading all Apache Tika deployments to version 3.2.2 or later, which contains the fix for the XXE vulnerability. Where immediate upgrade is not feasible, organizations should implement strict input validation and sanitization to block or quarantine PDFs containing XFA forms or suspicious XML content. Disabling or restricting XML external entity processing in the PDF parser configuration, if configurable, can reduce risk. Network segmentation and firewall rules should limit the ability of compromised systems to reach internal resources or external servers to prevent SSRF exploitation. Monitoring and logging of document processing activities can help detect anomalous behavior indicative of exploitation attempts. Security teams should review and update incident response plans to include scenarios involving document parsing vulnerabilities. Additionally, organizations should conduct code audits and dependency checks to identify all applications and services using vulnerable Apache Tika versions. Employee awareness training on handling untrusted documents can further reduce risk.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2025-08-04T16:04:26.626Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68a62d6bad5a09ad0008befd

Added to database: 8/20/2025, 8:17:47 PM

Last enriched: 1/22/2026, 8:06:24 PM

Last updated: 2/6/2026, 10:10:10 AM

Views: 251

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats