Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25556: CWE-415 Double Free in Artifex Software MuPDF

0
Medium
VulnerabilityCVE-2026-25556cvecve-2026-25556cwe-415
Published: Fri Feb 06 2026 (02/06/2026, 16:11:59 UTC)
Source: CVE Database V5
Vendor/Project: Artifex Software
Product: MuPDF

Description

MuPDF versions 1.23.0 through 1.27.0 contain a double-free vulnerability in fz_fill_pixmap_from_display_list() when an exception occurs during display list rendering. The function accepts a caller-owned fz_pixmap pointer but incorrectly drops the pixmap in its error handling path before rethrowing the exception. Callers (including the barcode decoding path in fz_decode_barcode_from_display_list) also drop the same pixmap in cleanup, resulting in a double-free that can corrupt the heap and crash the process. This issue affects applications that enable and use MuPDF barcode decoding and can be triggered by processing crafted input that causes a rendering-time error while decoding barcodes.

AI-Powered Analysis

AILast updated: 02/06/2026, 16:44:29 UTC

Technical Analysis

CVE-2026-25556 is a double-free vulnerability identified in Artifex Software's MuPDF library versions 1.23.0 through 1.27.0. The vulnerability resides in the function fz_fill_pixmap_from_display_list(), which is responsible for rendering display lists into pixmaps. When an exception occurs during rendering, this function erroneously frees a caller-owned fz_pixmap pointer in its error handling path before rethrowing the exception. Subsequently, the caller, including the barcode decoding path (fz_decode_barcode_from_display_list), also frees the same pixmap during cleanup. This results in a double-free condition that corrupts the heap, potentially leading to process crashes or undefined behavior. The vulnerability specifically affects applications that enable and use MuPDF's barcode decoding functionality. Exploitation requires processing crafted input that triggers a rendering-time error during barcode decoding, and user interaction is necessary to initiate the process. The CVSS 4.0 base score is 5.9 (medium severity), reflecting network attack vector, low attack complexity, no privileges required, but requiring user interaction and causing high impact on availability. No known exploits have been reported in the wild as of the publication date. The flaw primarily threatens application stability and availability rather than confidentiality or integrity. The vulnerability highlights the importance of proper memory management in error handling paths within complex rendering libraries like MuPDF.

Potential Impact

For European organizations, the primary impact of CVE-2026-25556 is the potential for denial-of-service conditions due to application crashes caused by heap corruption from the double-free vulnerability. Organizations relying on MuPDF for document rendering and barcode decoding—common in sectors such as logistics, healthcare, finance, and government—may experience service disruptions or application instability. This could affect automated document processing workflows, barcode scanning systems, and digital archiving solutions. While the vulnerability does not directly expose sensitive data or allow code execution, the resulting crashes could interrupt critical business operations and degrade user trust. Additionally, if attackers combine this vulnerability with other flaws, there may be an increased risk of more severe exploitation. The requirement for user interaction and crafted input somewhat limits remote exploitation, but phishing or malicious document delivery remain plausible attack vectors. European entities with compliance obligations around service availability and operational resilience should consider this vulnerability a significant operational risk.

Mitigation Recommendations

1. Update MuPDF to a patched version beyond 1.27.0 once available from Artifex Software to eliminate the double-free condition. 2. Temporarily disable barcode decoding features in MuPDF if they are not essential to reduce the attack surface. 3. Implement input validation and sanitization on documents and barcode data before processing with MuPDF to prevent crafted inputs from triggering rendering errors. 4. Employ memory protection mechanisms such as heap canaries, AddressSanitizer, or Control Flow Integrity (CFI) in applications embedding MuPDF to detect and mitigate heap corruption. 5. Monitor application logs for crashes or exceptions related to MuPDF rendering and investigate suspicious document inputs. 6. Educate users to avoid opening untrusted or suspicious documents that could exploit this vulnerability. 7. Use application sandboxing or containerization to limit the impact of potential crashes and isolate MuPDF processes. 8. Coordinate with software vendors and security teams to integrate vulnerability scanning and patch management for MuPDF dependencies.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-02T20:12:33.395Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69861711f9fa50a62f1b4d1e

Added to database: 2/6/2026, 4:30:09 PM

Last enriched: 2/6/2026, 4:44:29 PM

Last updated: 2/6/2026, 5:56:52 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats