Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58113: CWE-125: Out-of-bounds Read in PDF-XChange Co. Ltd PDF-XChange Editor

0
Medium
VulnerabilityCVE-2025-58113cvecve-2025-58113cwe-125
Published: Tue Dec 02 2025 (12/02/2025, 15:32:20 UTC)
Source: CVE Database V5
Vendor/Project: PDF-XChange Co. Ltd
Product: PDF-XChange Editor

Description

CVE-2025-58113 is an out-of-bounds read vulnerability in the EMF processing functionality of PDF-XChange Editor version 10. 7. 3. 401. An attacker can exploit this by crafting a malicious EMF file that, when opened by the vulnerable editor, causes the application to read memory outside of its intended bounds. This can lead to the disclosure of sensitive information from the process memory. The vulnerability requires user interaction to open the malicious file but does not require any privileges or authentication. It has a CVSS score of 6. 5, indicating a medium severity level. No known exploits are currently reported in the wild.

AI-Powered Analysis

AILast updated: 12/09/2025, 16:53:57 UTC

Technical Analysis

CVE-2025-58113 is a medium severity vulnerability classified under CWE-125 (Out-of-bounds Read) affecting PDF-XChange Editor version 10.7.3.401, specifically in its Enhanced Metafile (EMF) processing functionality. The vulnerability arises when the application processes a specially crafted EMF file, causing it to read memory beyond the allocated buffer boundaries. This out-of-bounds read does not allow code execution or modification of data but can lead to the unintended disclosure of sensitive information residing in adjacent memory areas. The attack vector is network-based (AV:N), requiring no privileges (PR:N) but does require user interaction (UI:R), such as opening a malicious file. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable application context. The confidentiality impact is high (C:H), while integrity and availability impacts are none (I:N, A:N). No patches or exploits are currently publicly available, but the vulnerability is documented and published as of December 2025. The vulnerability is significant because PDF-XChange Editor is widely used for document viewing and editing, and EMF files are a common vector for embedding graphical content. Attackers could leverage this flaw to extract sensitive data from memory, potentially including user credentials, cryptographic keys, or other confidential information processed by the application. The lack of authentication requirements and low attack complexity increase the risk, especially in environments where users frequently open untrusted documents.

Potential Impact

For European organizations, the primary impact of CVE-2025-58113 is the potential leakage of sensitive information through memory disclosure. This can compromise confidentiality of internal documents, user credentials, or cryptographic material handled by PDF-XChange Editor. Sectors such as finance, legal, government, and healthcare, which often process sensitive PDF documents, are particularly at risk. The vulnerability could be exploited via phishing campaigns or malicious document distribution, leading to data breaches or espionage. Although the vulnerability does not allow code execution or system compromise, the information disclosure could facilitate further attacks or unauthorized access. The requirement for user interaction means that user awareness and training can mitigate risk, but the widespread use of PDF-XChange Editor in European enterprises increases the attack surface. Additionally, the absence of a patch at the time of disclosure means organizations must rely on interim mitigations, increasing exposure duration. The impact on availability and integrity is negligible, but confidentiality breaches can have severe regulatory and reputational consequences under GDPR and other European data protection laws.

Mitigation Recommendations

1. Monitor PDF-XChange Co. Ltd communications and security advisories closely to apply patches immediately once released for version 10.7.3.401. 2. Until a patch is available, restrict the opening of EMF files or untrusted PDF documents containing embedded EMF content through application whitelisting or file type filtering at email gateways and endpoint security solutions. 3. Employ sandboxing or isolated environments for opening documents from untrusted sources to contain potential memory disclosure. 4. Educate users to avoid opening suspicious or unsolicited PDF files, especially those containing embedded graphics or EMF content. 5. Use endpoint detection and response (EDR) tools to monitor for anomalous application behavior related to PDF-XChange Editor. 6. Consider deploying application control policies that limit the use of vulnerable PDF-XChange Editor versions or replace it with alternative PDF readers with better security track records. 7. Implement network-level protections such as email attachment scanning and URL filtering to reduce the risk of malicious document delivery. 8. Conduct regular audits of software inventory to identify and remediate vulnerable versions promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2025-10-13T15:36:24.707Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692f093f16d939a309c3098d

Added to database: 12/2/2025, 3:43:59 PM

Last enriched: 12/9/2025, 4:53:57 PM

Last updated: 1/16/2026, 10:16:59 PM

Views: 83

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats