CVE-2025-65875: n/a
An arbitrary file upload vulnerability in the AddFont() function of FPDF v1.86 and earlier allows attackers to execute arbitrary code via uploading a crafted PHP file.
AI Analysis
Technical Summary
CVE-2025-65875 is an arbitrary file upload vulnerability identified in the AddFont() function of FPDF, a widely used PHP library for generating PDF documents. Versions 1.86 and earlier are affected. The vulnerability allows an attacker with low privileges to upload a malicious PHP file by exploiting insufficient validation in the AddFont() function. This uploaded file can then be executed on the server, leading to remote code execution (RCE). The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with an attack vector that is network-based and does not require user interaction. The vulnerability does not require authentication, making it easier for attackers to exploit. Although no known exploits are currently reported in the wild, the lack of patches or mitigation guidance increases the risk. The flaw arises from improper handling of font file uploads, where the system fails to restrict file types or sanitize file names, allowing PHP code injection. This can lead to full system compromise, data theft, or disruption of services relying on FPDF for PDF generation. Organizations embedding FPDF in web applications or document workflows should consider this vulnerability critical and prioritize remediation.
Potential Impact
For European organizations, the impact of CVE-2025-65875 can be severe. Many enterprises, government agencies, and service providers use FPDF or derivative tools for generating PDF documents dynamically. Exploitation could lead to unauthorized remote code execution on critical servers, resulting in data breaches, loss of sensitive information, and potential disruption of business operations. This is particularly concerning for sectors handling personal data under GDPR, as breaches could lead to regulatory penalties. The vulnerability's ease of exploitation (no authentication or user interaction required) increases the risk of automated attacks and widespread compromise. Additionally, compromised servers could be used as pivot points for lateral movement within networks, amplifying the damage. The absence of patches or official fixes at this time means organizations must rely on compensating controls to reduce exposure. The threat is heightened for organizations with public-facing web applications that integrate FPDF for document generation, especially if upload functionalities are exposed.
Mitigation Recommendations
1. Immediately audit all systems and applications using FPDF version 1.86 or earlier to identify vulnerable instances. 2. Restrict file upload permissions to trusted users and directories with no execute permissions. 3. Implement strict server-side validation to block upload of executable files, especially PHP scripts, by checking MIME types and file extensions. 4. Use web application firewalls (WAFs) to detect and block suspicious file upload attempts targeting the AddFont() function or related endpoints. 5. Isolate PDF generation services in segregated environments with minimal privileges to limit potential damage. 6. Monitor logs for unusual file uploads or execution attempts related to font files. 7. Engage with FPDF maintainers or community to obtain patches or updates as soon as they become available and plan prompt deployment. 8. Consider temporary disabling or restricting the AddFont() functionality if feasible until a fix is released. 9. Educate developers and administrators on secure file handling practices and the risks of arbitrary file uploads. 10. Conduct penetration testing focused on file upload vectors to validate the effectiveness of mitigations.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-65875: n/a
Description
An arbitrary file upload vulnerability in the AddFont() function of FPDF v1.86 and earlier allows attackers to execute arbitrary code via uploading a crafted PHP file.
AI-Powered Analysis
Technical Analysis
CVE-2025-65875 is an arbitrary file upload vulnerability identified in the AddFont() function of FPDF, a widely used PHP library for generating PDF documents. Versions 1.86 and earlier are affected. The vulnerability allows an attacker with low privileges to upload a malicious PHP file by exploiting insufficient validation in the AddFont() function. This uploaded file can then be executed on the server, leading to remote code execution (RCE). The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with an attack vector that is network-based and does not require user interaction. The vulnerability does not require authentication, making it easier for attackers to exploit. Although no known exploits are currently reported in the wild, the lack of patches or mitigation guidance increases the risk. The flaw arises from improper handling of font file uploads, where the system fails to restrict file types or sanitize file names, allowing PHP code injection. This can lead to full system compromise, data theft, or disruption of services relying on FPDF for PDF generation. Organizations embedding FPDF in web applications or document workflows should consider this vulnerability critical and prioritize remediation.
Potential Impact
For European organizations, the impact of CVE-2025-65875 can be severe. Many enterprises, government agencies, and service providers use FPDF or derivative tools for generating PDF documents dynamically. Exploitation could lead to unauthorized remote code execution on critical servers, resulting in data breaches, loss of sensitive information, and potential disruption of business operations. This is particularly concerning for sectors handling personal data under GDPR, as breaches could lead to regulatory penalties. The vulnerability's ease of exploitation (no authentication or user interaction required) increases the risk of automated attacks and widespread compromise. Additionally, compromised servers could be used as pivot points for lateral movement within networks, amplifying the damage. The absence of patches or official fixes at this time means organizations must rely on compensating controls to reduce exposure. The threat is heightened for organizations with public-facing web applications that integrate FPDF for document generation, especially if upload functionalities are exposed.
Mitigation Recommendations
1. Immediately audit all systems and applications using FPDF version 1.86 or earlier to identify vulnerable instances. 2. Restrict file upload permissions to trusted users and directories with no execute permissions. 3. Implement strict server-side validation to block upload of executable files, especially PHP scripts, by checking MIME types and file extensions. 4. Use web application firewalls (WAFs) to detect and block suspicious file upload attempts targeting the AddFont() function or related endpoints. 5. Isolate PDF generation services in segregated environments with minimal privileges to limit potential damage. 6. Monitor logs for unusual file uploads or execution attempts related to font files. 7. Engage with FPDF maintainers or community to obtain patches or updates as soon as they become available and plan prompt deployment. 8. Consider temporary disabling or restricting the AddFont() functionality if feasible until a fix is released. 9. Educate developers and administrators on secure file handling practices and the risks of arbitrary file uploads. 10. Conduct penetration testing focused on file upload vectors to validate the effectiveness of mitigations.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-11-18T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6982fcd3f9fa50a62f7662f8
Added to database: 2/4/2026, 8:01:23 AM
Last enriched: 2/4/2026, 8:10:32 AM
Last updated: 2/7/2026, 6:00:27 PM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2106: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2105: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2090: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2089: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2088: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.