Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23951: CWE-125: Out-of-bounds Read in sumatrapdfreader sumatrapdf

0
Medium
VulnerabilityCVE-2026-23951cvecve-2026-23951cwe-125cwe-191
Published: Thu Jan 22 2026 (01/22/2026, 00:17:10 UTC)
Source: CVE Database V5
Vendor/Project: sumatrapdfreader
Product: sumatrapdf

Description

CVE-2026-23951 is a medium severity vulnerability in SumatraPDF (versions up to 3. 5. 2rel) caused by an off-by-one error in PalmDbReader::GetRecord when processing crafted Mobi files. This leads to an integer underflow during size calculation, resulting in an out-of-bounds heap read that crashes the application. Exploitation requires local access and user interaction to open a malicious file, with no impact on confidentiality or integrity, only availability. No patches are currently available, and no known exploits exist in the wild. European organizations using SumatraPDF for document reading may experience denial of service if targeted. Mitigation involves avoiding opening untrusted Mobi files and monitoring for updates from the vendor. Countries with higher usage of SumatraPDF and significant document handling needs, such as Germany, France, and the UK, are most likely to be affected.

AI-Powered Analysis

AILast updated: 01/29/2026, 08:41:31 UTC

Technical Analysis

CVE-2026-23951 is a vulnerability identified in SumatraPDF, a lightweight multi-format document reader for Windows, affecting all versions up to 3.5.2rel. The flaw arises from an off-by-one error in the validation logic within the PalmDbReader::GetRecord function, which processes Mobi eBook files. Specifically, when exactly two records are present, the validation triggers an integer underflow during size calculation due to improper bounds checking. This underflow causes the application to perform an out-of-bounds read on the heap memory, leading to a crash of the SumatraPDF process. The vulnerability is classified under CWE-125 (Out-of-bounds Read) and CWE-191 (Integer Underflow). Exploitation requires a user to open a specially crafted Mobi file, thus necessitating user interaction and local access. The vulnerability does not expose confidential data or allow code execution but results in denial of service by crashing the application. As of the publication date, no patches or fixes have been released, and no public exploits have been reported. The CVSS v3.1 score is 5.5 (medium), reflecting the limited impact and exploitation complexity. The attack vector is local (AV:L), with low attack complexity (AC:L), no privileges required (PR:N), but user interaction is necessary (UI:R). The scope remains unchanged (S:U), with no confidentiality or integrity impact but high impact on availability (A:H).

Potential Impact

For European organizations, the primary impact of CVE-2026-23951 is denial of service due to application crashes when opening malicious Mobi files. This can disrupt workflows, especially in environments where SumatraPDF is used extensively for document reading or eBook processing, such as publishing houses, libraries, educational institutions, and legal firms. Although the vulnerability does not lead to data breaches or code execution, repeated crashes could lead to productivity loss and potential operational disruptions. Organizations relying on automated document processing or user environments where untrusted files might be opened are at higher risk. Since no known exploits are in the wild, the immediate threat is low, but the absence of patches means the vulnerability remains exploitable if attackers develop payloads. The requirement for user interaction limits remote exploitation but does not eliminate risk in scenarios involving phishing or malicious file distribution. The impact on availability could also affect business continuity if critical users or systems are targeted.

Mitigation Recommendations

1. Avoid opening Mobi files from untrusted or unknown sources until a patch is released. 2. Implement strict email and file filtering policies to block or quarantine suspicious Mobi files. 3. Educate users about the risks of opening unsolicited or unexpected eBook files, emphasizing caution with Mobi format files. 4. Monitor SumatraPDF usage within the organization and consider restricting its use or replacing it with alternative PDF/eBook readers that are not vulnerable. 5. Employ application whitelisting and sandboxing to limit the impact of crashes and prevent potential exploitation attempts. 6. Regularly check for vendor updates or security advisories to apply patches promptly once available. 7. Use endpoint detection and response (EDR) tools to detect abnormal application crashes or suspicious file access patterns related to SumatraPDF. 8. Maintain backups and incident response plans to quickly recover from potential denial of service incidents.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-19T14:49:06.312Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697174714623b1157cfcd293

Added to database: 1/22/2026, 12:50:57 AM

Last enriched: 1/29/2026, 8:41:31 AM

Last updated: 2/6/2026, 7:01:45 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats