Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70559: n/a

0
Medium
VulnerabilityCVE-2025-70559cvecve-2025-70559
Published: Tue Feb 03 2026 (02/03/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

pdfminer.six before 20251230 contains an insecure deserialization vulnerability in the CMap loading mechanism. The library uses Python pickle to deserialize CMap cache files without validation. An attacker with the ability to place a malicious pickle file in a location accessible to the application can trigger arbitrary code execution or privilege escalation when the file is loaded by a trusted process. This is caused by an incomplete patch to CVE-2025-64512.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/12/2026, 06:52:04 UTC

Technical Analysis

CVE-2025-70559 is a vulnerability in the pdfminer.six library, a popular Python tool used for extracting information from PDF documents. The flaw is due to insecure deserialization in the CMap loading mechanism. Specifically, pdfminer.six uses Python's pickle module to deserialize CMap cache files without validating the content, which is inherently unsafe because pickle can execute arbitrary code during deserialization. An attacker who can place a crafted malicious pickle file in a location accessible to the application can trigger arbitrary code execution or privilege escalation when the vulnerable process loads the file. This vulnerability is a consequence of an incomplete patch addressing a previous similar issue (CVE-2025-64512). The vulnerability affects all versions before 20251230, although exact affected versions are not specified. The CVSS 3.1 base score is 6.5, with vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N, indicating that the attack can be launched remotely without authentication or user interaction, impacting confidentiality and integrity but not availability. No public exploits are known yet. The vulnerability is categorized under CWE-502 (Deserialization of Untrusted Data). Since pdfminer.six is widely used in automated PDF processing pipelines, this vulnerability poses a risk especially in environments where untrusted or user-controlled files might be processed or where an attacker can influence file placement.

Potential Impact

For European organizations, the impact of CVE-2025-70559 depends on their use of pdfminer.six in document processing, data extraction, or PDF analysis workflows. Successful exploitation could lead to arbitrary code execution or privilege escalation, potentially allowing attackers to compromise systems, steal sensitive information, or move laterally within networks. Confidentiality and integrity of data processed by vulnerable applications are at risk. Organizations handling sensitive documents or operating in regulated sectors (finance, healthcare, government) could face significant operational and compliance consequences. The vulnerability does not affect availability directly but could be leveraged as a foothold for further attacks. Since exploitation requires the attacker to place a malicious pickle file accessible to the application, environments with weak file system permissions or those processing files from untrusted sources are particularly vulnerable. European entities relying on automated PDF processing in cloud or on-premises environments should assess exposure carefully.

Mitigation Recommendations

1. Apply patches or upgrade pdfminer.six to version 20251230 or later once available to ensure the deserialization vulnerability is fixed. 2. Until patches are released, restrict write permissions on directories used for CMap cache files to trusted users only, preventing attackers from placing malicious pickle files. 3. Implement strict input validation and sandboxing around PDF processing workflows to limit exposure to untrusted files. 4. Monitor file system locations used by pdfminer.six for unexpected or suspicious files. 5. Use application whitelisting and runtime protections to detect or block unauthorized code execution attempts. 6. Consider isolating PDF processing services in containers or restricted environments to limit impact of potential exploitation. 7. Review and harden access controls and logging around systems using pdfminer.six to detect and respond to suspicious activity promptly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6982fcd6f9fa50a62f766375

Added to database: 2/4/2026, 8:01:26 AM

Last enriched: 2/12/2026, 6:52:04 AM

Last updated: 3/25/2026, 2:39:27 AM

Views: 119

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses