CVE-2026-25556: CWE-415 Double Free in Artifex Software MuPDF
MuPDF versions 1.23.0 through 1.27.0 contain a double-free vulnerability in fz_fill_pixmap_from_display_list() when an exception occurs during display list rendering. The function accepts a caller-owned fz_pixmap pointer but incorrectly drops the pixmap in its error handling path before rethrowing the exception. Callers (including the barcode decoding path in fz_decode_barcode_from_display_list) also drop the same pixmap in cleanup, resulting in a double-free that can corrupt the heap and crash the process. This issue affects applications that enable and use MuPDF barcode decoding and can be triggered by processing crafted input that causes a rendering-time error while decoding barcodes.
AI Analysis
Technical Summary
CVE-2026-25556 is a double-free vulnerability identified in Artifex Software's MuPDF library, specifically affecting versions 1.23.0 through 1.27.0. The vulnerability resides in the function fz_fill_pixmap_from_display_list(), which is responsible for rendering display lists into pixmaps. When an exception occurs during rendering, the function erroneously frees a caller-owned fz_pixmap pointer in its error handling path before rethrowing the exception. Since the caller also frees the same pixmap during cleanup, this leads to a double-free condition. This heap corruption can cause the process to crash or potentially be exploited to execute arbitrary code, although no public exploits are known. The issue is particularly relevant when MuPDF's barcode decoding feature is enabled, as the barcode decoding path (fz_decode_barcode_from_display_list) uses this function and can be triggered by crafted inputs that cause rendering errors during barcode decoding. The vulnerability does not require privileges but does require user interaction to process maliciously crafted documents. The CVSS v4.0 base score is 5.9, reflecting a medium severity with network attack vector, low attack complexity, partial attack prerequisites, and user interaction required. The vulnerability impacts confidentiality minimally but can significantly affect availability due to crashes. No patches are linked yet, so users must monitor vendor advisories. This flaw is categorized under CWE-415 (Double Free).
Potential Impact
The primary impact of CVE-2026-25556 is the potential for denial of service through application crashes caused by heap corruption. In environments where MuPDF is embedded in document viewers or processing tools that handle barcode decoding, attackers can craft malicious PDF files that trigger this vulnerability, causing the application to terminate unexpectedly. While no known exploits currently exist for arbitrary code execution, the heap corruption could be leveraged in complex attack chains to escalate impact. Organizations relying on automated document processing, especially those using barcode data extraction, may face operational disruptions. This could affect sectors such as logistics, healthcare, finance, and government where barcode-embedded documents are common. The vulnerability's requirement for user interaction limits remote exploitation but does not eliminate risk, especially in environments where users open untrusted documents. The absence of patches increases exposure duration. Overall, the threat could lead to service interruptions, potential data processing delays, and increased incident response costs.
Mitigation Recommendations
To mitigate CVE-2026-25556, organizations should first monitor Artifex Software's official channels for patches addressing this vulnerability and apply updates promptly once available. Until patches are released, disabling the barcode decoding feature in MuPDF is a practical mitigation to prevent triggering the vulnerable code path. Additionally, organizations should implement strict document handling policies, including scanning and sandboxing PDF files before processing or opening them in MuPDF-based applications. Employing endpoint protection solutions that detect anomalous application crashes or heap corruption patterns can aid in early detection. Training users to avoid opening untrusted or suspicious PDF documents reduces the risk of exploitation. For developers embedding MuPDF, reviewing and modifying error handling in fz_fill_pixmap_from_display_list() to prevent double-free conditions is recommended. Finally, maintaining robust backup and incident response plans will help mitigate operational impacts if exploitation occurs.
Affected Countries
United States, Germany, Japan, South Korea, China, United Kingdom, France, Canada, Australia, India
CVE-2026-25556: CWE-415 Double Free in Artifex Software MuPDF
Description
MuPDF versions 1.23.0 through 1.27.0 contain a double-free vulnerability in fz_fill_pixmap_from_display_list() when an exception occurs during display list rendering. The function accepts a caller-owned fz_pixmap pointer but incorrectly drops the pixmap in its error handling path before rethrowing the exception. Callers (including the barcode decoding path in fz_decode_barcode_from_display_list) also drop the same pixmap in cleanup, resulting in a double-free that can corrupt the heap and crash the process. This issue affects applications that enable and use MuPDF barcode decoding and can be triggered by processing crafted input that causes a rendering-time error while decoding barcodes.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-25556 is a double-free vulnerability identified in Artifex Software's MuPDF library, specifically affecting versions 1.23.0 through 1.27.0. The vulnerability resides in the function fz_fill_pixmap_from_display_list(), which is responsible for rendering display lists into pixmaps. When an exception occurs during rendering, the function erroneously frees a caller-owned fz_pixmap pointer in its error handling path before rethrowing the exception. Since the caller also frees the same pixmap during cleanup, this leads to a double-free condition. This heap corruption can cause the process to crash or potentially be exploited to execute arbitrary code, although no public exploits are known. The issue is particularly relevant when MuPDF's barcode decoding feature is enabled, as the barcode decoding path (fz_decode_barcode_from_display_list) uses this function and can be triggered by crafted inputs that cause rendering errors during barcode decoding. The vulnerability does not require privileges but does require user interaction to process maliciously crafted documents. The CVSS v4.0 base score is 5.9, reflecting a medium severity with network attack vector, low attack complexity, partial attack prerequisites, and user interaction required. The vulnerability impacts confidentiality minimally but can significantly affect availability due to crashes. No patches are linked yet, so users must monitor vendor advisories. This flaw is categorized under CWE-415 (Double Free).
Potential Impact
The primary impact of CVE-2026-25556 is the potential for denial of service through application crashes caused by heap corruption. In environments where MuPDF is embedded in document viewers or processing tools that handle barcode decoding, attackers can craft malicious PDF files that trigger this vulnerability, causing the application to terminate unexpectedly. While no known exploits currently exist for arbitrary code execution, the heap corruption could be leveraged in complex attack chains to escalate impact. Organizations relying on automated document processing, especially those using barcode data extraction, may face operational disruptions. This could affect sectors such as logistics, healthcare, finance, and government where barcode-embedded documents are common. The vulnerability's requirement for user interaction limits remote exploitation but does not eliminate risk, especially in environments where users open untrusted documents. The absence of patches increases exposure duration. Overall, the threat could lead to service interruptions, potential data processing delays, and increased incident response costs.
Mitigation Recommendations
To mitigate CVE-2026-25556, organizations should first monitor Artifex Software's official channels for patches addressing this vulnerability and apply updates promptly once available. Until patches are released, disabling the barcode decoding feature in MuPDF is a practical mitigation to prevent triggering the vulnerable code path. Additionally, organizations should implement strict document handling policies, including scanning and sandboxing PDF files before processing or opening them in MuPDF-based applications. Employing endpoint protection solutions that detect anomalous application crashes or heap corruption patterns can aid in early detection. Training users to avoid opening untrusted or suspicious PDF documents reduces the risk of exploitation. For developers embedding MuPDF, reviewing and modifying error handling in fz_fill_pixmap_from_display_list() to prevent double-free conditions is recommended. Finally, maintaining robust backup and incident response plans will help mitigate operational impacts if exploitation occurs.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2026-02-02T20:12:33.395Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69861711f9fa50a62f1b4d1e
Added to database: 2/6/2026, 4:30:09 PM
Last enriched: 3/5/2026, 9:22:45 AM
Last updated: 3/23/2026, 6:55:52 PM
Views: 105
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.