Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63917: n/a

0
High
VulnerabilityCVE-2025-63917cvecve-2025-63917
Published: Mon Nov 17 2025 (11/17/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

PDFPatcher thru 1.1.3.4663 executable's XML bookmark import functionality does not restrict XML external entity (XXE) references. The application uses .NET's XmlDocument class without disabling external entity resolution, enabling attackers to: Read arbitrary files from the victim's filesystem, exfiltrate sensitive data via out-of-band (OOB) HTTP requests, perform SSRF attacks against internal network resources, or cause a denial of service via entity expansion attacks.

AI-Powered Analysis

AILast updated: 11/24/2025, 17:37:59 UTC

Technical Analysis

CVE-2025-63917 identifies a critical XML External Entity (XXE) vulnerability in PDFPatcher, a tool used for managing PDF bookmarks. The vulnerability exists because the application uses the .NET XmlDocument class to parse XML bookmark imports without disabling the resolution of external entities. This improper configuration allows attackers to craft malicious XML files containing external entity references. When such a file is imported, the application processes these entities, enabling several attack vectors: reading arbitrary files on the host system, exfiltrating sensitive data through out-of-band (OOB) HTTP requests to attacker-controlled servers, conducting SSRF attacks to access internal network resources that are otherwise inaccessible externally, and causing denial of service via entity expansion attacks (billion laughs or similar). The vulnerability is exploitable remotely over the network without authentication but requires user interaction to import the malicious XML. The CVSS v3.1 base score is 7.1, reflecting high confidentiality impact, low attack complexity, no privileges required, and user interaction needed. No patches or exploits are currently publicly known, but the risk is significant given the sensitive nature of data potentially exposed and the common use of .NET XML parsers. The CWE-611 classification confirms this as an XXE issue. Organizations relying on PDFPatcher for document processing should consider this vulnerability critical and act accordingly.

Potential Impact

For European organizations, the impact of CVE-2025-63917 can be substantial, particularly in sectors such as finance, legal, government, and healthcare where PDF documents often contain sensitive or confidential information. Exploitation could lead to unauthorized disclosure of sensitive files, potentially violating data protection regulations like GDPR. SSRF capabilities could allow attackers to pivot into internal networks, accessing otherwise protected resources, increasing the risk of lateral movement and further compromise. Denial of service attacks could disrupt business operations reliant on PDFPatcher for document workflows. Since the vulnerability requires user interaction, phishing or social engineering campaigns could be used to trick employees into importing malicious XML files, increasing the attack surface. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as proof-of-concept exploits may emerge. The high confidentiality impact combined with the potential for internal network compromise makes this vulnerability a serious concern for European enterprises.

Mitigation Recommendations

Immediate mitigation steps include disabling external entity resolution in the XML parser used by PDFPatcher. For .NET applications, this involves configuring XmlReaderSettings or XmlDocument to prohibit DTD processing and external entity resolution. Organizations should audit their use of PDFPatcher and restrict the import of XML bookmarks to trusted sources only. Employing network-level controls to block outbound HTTP requests to untrusted domains can limit data exfiltration via OOB channels. Monitoring and alerting on unusual outbound traffic patterns can help detect exploitation attempts. Until an official patch is released, consider isolating PDFPatcher usage to segmented environments with limited access to sensitive data and internal networks. User education to recognize suspicious files and avoid importing untrusted XML bookmarks is critical. Finally, maintain up-to-date backups and incident response plans to quickly recover from potential denial of service or data breaches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691b4e4fb1dcb1316b01656b

Added to database: 11/17/2025, 4:33:19 PM

Last enriched: 11/24/2025, 5:37:59 PM

Last updated: 1/7/2026, 8:54:16 AM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats