CVE-2025-64512

Pdfminer.six is a community maintained fork of the original PDFMiner, a tool for extracting information from PDF documents. Prior to version 20251107, pdfminer.six will execute arbitrary code from a malicious pickle file if provided with a malicious PDF file. The `CMapDB._load_data()` function in pdfminer.six uses `pickle.loads()` to deserialize pickle files. These pickle files are supposed to be part of the pdfminer.six distribution stored in the `cmap/` directory, but a malicious PDF can specify an alternative directory and filename as long as the filename ends in `.pickle.gz`. A malicious, zipped pickle file can then contain code which will automatically execute when the PDF is processed. Version 20251107 fixes the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pdfminer:pdfminer.six:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

08 Jan 2026, 22:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2026/01/msg00005.html -

31 Dec 2025, 17:58

Type Values Removed Values Added
Summary
  • (es) Pdfminer.six es una bifurcación mantenida por la comunidad del PDFMiner original, una herramienta para extraer información de documentos PDF. Antes de la versión 20251107, pdfminer.six ejecutará código arbitrario de un archivo pickle malicioso si se le proporciona un archivo PDF malicioso. La función 'CMapDB._load_data()' en pdfminer.six utiliza 'pickle.loads()' para deserializar archivos pickle. Se supone que estos archivos pickle forman parte de la distribución de pdfminer.six almacenada en el directorio 'cmap/', pero un PDF malicioso puede especificar un directorio y nombre de archivo alternativos siempre que el nombre de archivo termine en '.pickle.gz'. Un archivo pickle malicioso y comprimido puede entonces contener código que se ejecutará automáticamente cuando se procese el PDF. La versión 20251107 corrige el problema.
CPE cpe:2.3:a:pdfminer:pdfminer.six:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
References () https://github.com/pdfminer/pdfminer.six/commit/b808ee05dd7f0c8ea8ec34bdf394d40e63501086 - () https://github.com/pdfminer/pdfminer.six/commit/b808ee05dd7f0c8ea8ec34bdf394d40e63501086 - Patch
References () https://github.com/pdfminer/pdfminer.six/releases/tag/20251107 - () https://github.com/pdfminer/pdfminer.six/releases/tag/20251107 - Release Notes
References () https://github.com/pdfminer/pdfminer.six/security/advisories/GHSA-wf5f-4jwr-ppcp - () https://github.com/pdfminer/pdfminer.six/security/advisories/GHSA-wf5f-4jwr-ppcp - Exploit, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2025/11/msg00017.html - () https://lists.debian.org/debian-lts-announce/2025/11/msg00017.html - Mailing List
First Time Debian debian Linux
Pdfminer
Debian
Pdfminer pdfminer.six

19 Nov 2025, 01:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/11/msg00017.html -

12 Nov 2025, 21:15

Type Values Removed Values Added
References () https://github.com/pdfminer/pdfminer.six/security/advisories/GHSA-wf5f-4jwr-ppcp - () https://github.com/pdfminer/pdfminer.six/security/advisories/GHSA-wf5f-4jwr-ppcp -

10 Nov 2025, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-10 22:15

Updated : 2026-01-08 22:16


NVD link : CVE-2025-64512

Mitre link : CVE-2025-64512

CVE.ORG link : CVE-2025-64512


JSON object : View

Products Affected

debian

  • debian_linux

pdfminer

  • pdfminer.six
CWE
CWE-502

Deserialization of Untrusted Data