CVE-2025-64512: CWE-502: Deserialization of Untrusted Data in pdfminer pdfminer.six
Pdfminer.six is a community maintained fork of the original PDFMiner, a tool for extracting information from PDF documents. Prior to version 20251107, pdfminer.six will execute arbitrary code from a malicious pickle file if provided with a malicious PDF file. The `CMapDB._load_data()` function in pdfminer.six uses `pickle.loads()` to deserialize pickle files. These pickle files are supposed to be part of the pdfminer.six distribution stored in the `cmap/` directory, but a malicious PDF can specify an alternative directory and filename as long as the filename ends in `.pickle.gz`. A malicious, zipped pickle file can then contain code which will automatically execute when the PDF is processed. Version 20251107 fixes the issue.
AI Analysis
Technical Summary
CVE-2025-64512 is a deserialization vulnerability classified under CWE-502 affecting pdfminer.six, a widely used Python library for extracting information from PDF documents. The vulnerability exists in the CMapDB._load_data() function, which uses Python's pickle.loads() to deserialize data from pickle files. Normally, these pickle files are trusted components distributed with pdfminer.six and stored in the cmap/ directory. However, a malicious PDF can specify an alternative directory and filename ending with .pickle.gz, allowing an attacker to supply a malicious, compressed pickle file. When pdfminer.six processes such a PDF, it decompresses and deserializes the pickle file, triggering arbitrary code execution. This can lead to full system compromise, including unauthorized data access, modification, or denial of service. The vulnerability requires user interaction (opening a malicious PDF) and local access (AV:L), but no privileges or authentication are needed. The issue was fixed in version 20251107 by presumably removing or securing the unsafe deserialization mechanism. Although no exploits are reported in the wild, the vulnerability's nature and high CVSS score (8.6) highlight its criticality, especially in environments processing untrusted PDFs automatically or manually.
Potential Impact
For European organizations, the impact of CVE-2025-64512 can be significant. Organizations relying on pdfminer.six for automated PDF processing, document indexing, or data extraction in sectors such as finance, government, legal, and healthcare could face severe risks. Exploitation could lead to arbitrary code execution on systems processing malicious PDFs, resulting in data breaches, ransomware deployment, or disruption of critical services. Confidentiality is at risk due to potential data exfiltration, integrity can be compromised by unauthorized modifications, and availability may be affected by denial-of-service conditions or malware payloads. Given the widespread use of pdfminer.six in open-source and commercial tools, the attack surface includes both endpoint and server environments. The requirement for user interaction limits mass exploitation but targeted spear-phishing or supply chain attacks remain plausible. The vulnerability could also be leveraged in multi-stage attacks against European critical infrastructure or enterprises handling sensitive documents.
Mitigation Recommendations
The primary mitigation is to upgrade pdfminer.six to version 20251107 or later, where the unsafe deserialization has been addressed. Organizations should audit their environments to identify all instances of pdfminer.six usage, including embedded or indirect dependencies in software stacks. Restricting the processing of PDFs from untrusted or unknown sources can reduce exposure. Implement sandboxing or containerization for PDF processing workflows to contain potential exploitation. Employ network and endpoint detection tools to monitor for anomalous behavior indicative of code execution following PDF processing. Educate users about the risks of opening PDFs from unverified senders. For developers, consider replacing pickle-based deserialization with safer alternatives or validating inputs rigorously before deserialization. Regularly update dependencies and monitor vulnerability disclosures related to pdfminer.six and similar libraries.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Belgium, Poland, Finland
CVE-2025-64512: CWE-502: Deserialization of Untrusted Data in pdfminer pdfminer.six
Description
Pdfminer.six is a community maintained fork of the original PDFMiner, a tool for extracting information from PDF documents. Prior to version 20251107, pdfminer.six will execute arbitrary code from a malicious pickle file if provided with a malicious PDF file. The `CMapDB._load_data()` function in pdfminer.six uses `pickle.loads()` to deserialize pickle files. These pickle files are supposed to be part of the pdfminer.six distribution stored in the `cmap/` directory, but a malicious PDF can specify an alternative directory and filename as long as the filename ends in `.pickle.gz`. A malicious, zipped pickle file can then contain code which will automatically execute when the PDF is processed. Version 20251107 fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-64512 is a deserialization vulnerability classified under CWE-502 affecting pdfminer.six, a widely used Python library for extracting information from PDF documents. The vulnerability exists in the CMapDB._load_data() function, which uses Python's pickle.loads() to deserialize data from pickle files. Normally, these pickle files are trusted components distributed with pdfminer.six and stored in the cmap/ directory. However, a malicious PDF can specify an alternative directory and filename ending with .pickle.gz, allowing an attacker to supply a malicious, compressed pickle file. When pdfminer.six processes such a PDF, it decompresses and deserializes the pickle file, triggering arbitrary code execution. This can lead to full system compromise, including unauthorized data access, modification, or denial of service. The vulnerability requires user interaction (opening a malicious PDF) and local access (AV:L), but no privileges or authentication are needed. The issue was fixed in version 20251107 by presumably removing or securing the unsafe deserialization mechanism. Although no exploits are reported in the wild, the vulnerability's nature and high CVSS score (8.6) highlight its criticality, especially in environments processing untrusted PDFs automatically or manually.
Potential Impact
For European organizations, the impact of CVE-2025-64512 can be significant. Organizations relying on pdfminer.six for automated PDF processing, document indexing, or data extraction in sectors such as finance, government, legal, and healthcare could face severe risks. Exploitation could lead to arbitrary code execution on systems processing malicious PDFs, resulting in data breaches, ransomware deployment, or disruption of critical services. Confidentiality is at risk due to potential data exfiltration, integrity can be compromised by unauthorized modifications, and availability may be affected by denial-of-service conditions or malware payloads. Given the widespread use of pdfminer.six in open-source and commercial tools, the attack surface includes both endpoint and server environments. The requirement for user interaction limits mass exploitation but targeted spear-phishing or supply chain attacks remain plausible. The vulnerability could also be leveraged in multi-stage attacks against European critical infrastructure or enterprises handling sensitive documents.
Mitigation Recommendations
The primary mitigation is to upgrade pdfminer.six to version 20251107 or later, where the unsafe deserialization has been addressed. Organizations should audit their environments to identify all instances of pdfminer.six usage, including embedded or indirect dependencies in software stacks. Restricting the processing of PDFs from untrusted or unknown sources can reduce exposure. Implement sandboxing or containerization for PDF processing workflows to contain potential exploitation. Employ network and endpoint detection tools to monitor for anomalous behavior indicative of code execution following PDF processing. Educate users about the risks of opening PDFs from unverified senders. For developers, consider replacing pickle-based deserialization with safer alternatives or validating inputs rigorously before deserialization. Regularly update dependencies and monitor vulnerability disclosures related to pdfminer.six and similar libraries.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-05T21:15:39.399Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6912626244f28dbfe990a14d
Added to database: 11/10/2025, 10:08:34 PM
Last enriched: 11/10/2025, 10:18:26 PM
Last updated: 11/11/2025, 12:07:47 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-63678: n/a
UnknownCVE-2025-11892: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in GitHub Enterprise Server
HighCVE-2025-11578: CWE-59 Improper Link Resolution Before File Access ('Link Following') in GitHub Enterprise Server
HighCVE-2025-64529: CWE-770: Allocation of Resources Without Limits or Throttling in authzed spicedb
LowCVE-2025-64522: CWE-918: Server-Side Request Forgery (SSRF) in charmbracelet soft-serve
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.