Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63917: n/a

0
Unknown
VulnerabilityCVE-2025-63917cvecve-2025-63917
Published: Mon Nov 17 2025 (11/17/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

PDFPatcher thru 1.1.3.4663 executable's XML bookmark import functionality does not restrict XML external entity (XXE) references. The application uses .NET's XmlDocument class without disabling external entity resolution, enabling attackers to: Read arbitrary files from the victim's filesystem, exfiltrate sensitive data via out-of-band (OOB) HTTP requests, perform SSRF attacks against internal network resources, or cause a denial of service via entity expansion attacks.

AI-Powered Analysis

AILast updated: 11/17/2025, 16:38:25 UTC

Technical Analysis

CVE-2025-63917 identifies a critical XML External Entity (XXE) vulnerability in PDFPatcher, a PDF processing tool, affecting versions up to 1.1.3.4663. The vulnerability arises because the application’s XML bookmark import functionality uses the .NET XmlDocument class without disabling the resolution of external entities. This misconfiguration enables attackers to craft malicious XML input containing external entity references. When processed, these references can cause the application to read arbitrary files from the victim’s filesystem, potentially exposing sensitive data. Additionally, attackers can leverage out-of-band (OOB) HTTP requests embedded in the XML to exfiltrate data covertly. The vulnerability also allows Server-Side Request Forgery (SSRF) attacks, enabling attackers to probe or interact with internal network resources that are otherwise inaccessible externally. Furthermore, the application is susceptible to denial of service (DoS) attacks through entity expansion (billion laughs attack), which can exhaust system resources and crash the application. The vulnerability does not require authentication or user interaction beyond processing a crafted XML bookmark import, increasing the risk of exploitation. Although no known exploits are currently reported in the wild, the technical ease of exploitation and the broad impact on confidentiality, integrity, and availability make this a significant threat. The lack of a CVSS score suggests the need for a manual severity assessment. The vulnerability affects organizations that utilize PDFPatcher for PDF manipulation, particularly those processing untrusted or external XML bookmark files.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to the confidentiality and availability of sensitive information. Attackers exploiting the XXE flaw can access confidential files, including intellectual property, personal data protected under GDPR, or internal configuration files, leading to data breaches and regulatory penalties. The SSRF capability can be used to pivot attacks into internal networks, potentially compromising critical infrastructure or internal services. Denial of service attacks can disrupt business operations, affecting service availability and causing operational downtime. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on PDFPatcher for document processing are particularly vulnerable. The ability to exfiltrate data via OOB channels complicates detection and response efforts. Given the widespread use of .NET applications in Europe and the reliance on PDF tools, the vulnerability could have a broad impact if exploited at scale.

Mitigation Recommendations

Immediate mitigation involves disabling external entity resolution in the XML parser used by PDFPatcher. Developers or administrators should configure the .NET XmlDocument class to prohibit DTD processing and external entity resolution by setting XmlResolver to null and enabling secure XML parsing settings. Until an official patch is released, organizations should avoid importing XML bookmarks from untrusted sources or implement strict input validation and sandboxing of the import process. Network-level controls such as egress filtering can help prevent OOB data exfiltration and SSRF attacks by restricting outbound HTTP requests from the application environment. Monitoring for unusual outbound traffic and implementing anomaly detection can aid in early detection of exploitation attempts. Once a patch or updated version of PDFPatcher is available, organizations should apply it promptly. Additionally, conducting security awareness training for users handling PDF imports and reviewing application logs for suspicious activity are recommended.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691b4e4fb1dcb1316b01656b

Added to database: 11/17/2025, 4:33:19 PM

Last enriched: 11/17/2025, 4:38:25 PM

Last updated: 11/17/2025, 5:46:15 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats