Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64512: CWE-502: Deserialization of Untrusted Data in pdfminer pdfminer.six

0
High
VulnerabilityCVE-2025-64512cvecve-2025-64512cwe-502
Published: Mon Nov 10 2025 (11/10/2025, 21:58:37 UTC)
Source: CVE Database V5
Vendor/Project: pdfminer
Product: pdfminer.six

Description

Pdfminer.six is a community maintained fork of the original PDFMiner, a tool for extracting information from PDF documents. Prior to version 20251107, pdfminer.six will execute arbitrary code from a malicious pickle file if provided with a malicious PDF file. The `CMapDB._load_data()` function in pdfminer.six uses `pickle.loads()` to deserialize pickle files. These pickle files are supposed to be part of the pdfminer.six distribution stored in the `cmap/` directory, but a malicious PDF can specify an alternative directory and filename as long as the filename ends in `.pickle.gz`. A malicious, zipped pickle file can then contain code which will automatically execute when the PDF is processed. Version 20251107 fixes the issue.

AI-Powered Analysis

AILast updated: 11/10/2025, 22:18:26 UTC

Technical Analysis

CVE-2025-64512 is a deserialization vulnerability classified under CWE-502 affecting pdfminer.six, a widely used Python library for extracting information from PDF documents. The vulnerability exists in the CMapDB._load_data() function, which uses Python's pickle.loads() to deserialize data from pickle files. Normally, these pickle files are trusted components distributed with pdfminer.six and stored in the cmap/ directory. However, a malicious PDF can specify an alternative directory and filename ending with .pickle.gz, allowing an attacker to supply a malicious, compressed pickle file. When pdfminer.six processes such a PDF, it decompresses and deserializes the pickle file, triggering arbitrary code execution. This can lead to full system compromise, including unauthorized data access, modification, or denial of service. The vulnerability requires user interaction (opening a malicious PDF) and local access (AV:L), but no privileges or authentication are needed. The issue was fixed in version 20251107 by presumably removing or securing the unsafe deserialization mechanism. Although no exploits are reported in the wild, the vulnerability's nature and high CVSS score (8.6) highlight its criticality, especially in environments processing untrusted PDFs automatically or manually.

Potential Impact

For European organizations, the impact of CVE-2025-64512 can be significant. Organizations relying on pdfminer.six for automated PDF processing, document indexing, or data extraction in sectors such as finance, government, legal, and healthcare could face severe risks. Exploitation could lead to arbitrary code execution on systems processing malicious PDFs, resulting in data breaches, ransomware deployment, or disruption of critical services. Confidentiality is at risk due to potential data exfiltration, integrity can be compromised by unauthorized modifications, and availability may be affected by denial-of-service conditions or malware payloads. Given the widespread use of pdfminer.six in open-source and commercial tools, the attack surface includes both endpoint and server environments. The requirement for user interaction limits mass exploitation but targeted spear-phishing or supply chain attacks remain plausible. The vulnerability could also be leveraged in multi-stage attacks against European critical infrastructure or enterprises handling sensitive documents.

Mitigation Recommendations

The primary mitigation is to upgrade pdfminer.six to version 20251107 or later, where the unsafe deserialization has been addressed. Organizations should audit their environments to identify all instances of pdfminer.six usage, including embedded or indirect dependencies in software stacks. Restricting the processing of PDFs from untrusted or unknown sources can reduce exposure. Implement sandboxing or containerization for PDF processing workflows to contain potential exploitation. Employ network and endpoint detection tools to monitor for anomalous behavior indicative of code execution following PDF processing. Educate users about the risks of opening PDFs from unverified senders. For developers, consider replacing pickle-based deserialization with safer alternatives or validating inputs rigorously before deserialization. Regularly update dependencies and monitor vulnerability disclosures related to pdfminer.six and similar libraries.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-05T21:15:39.399Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6912626244f28dbfe990a14d

Added to database: 11/10/2025, 10:08:34 PM

Last enriched: 11/10/2025, 10:18:26 PM

Last updated: 11/11/2025, 12:07:47 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats