CVE-2025-9394

A flaw has been found in PoDoFo 1.1.0-dev. This issue affects the function PdfTokenizer::DetermineDataType of the file src/podofo/main/PdfTokenizer.cpp of the component PDF Dictionary Parser. Executing manipulation can lead to use after free. It is possible to launch the attack on the local host. The exploit has been published and may be used. This patch is called 22d16cb142f293bf956f66a4d399cdd65576d36c. A patch should be applied to remediate this issue.
References
Link Resource
https://drive.google.com/file/d/1edJH17GAiK9R441Gjyj8tiV_2ptoL16U/view?usp=sharing Exploit
https://github.com/podofo/podofo/commit/22d16cb142f293bf956f66a4d399cdd65576d36c Patch
https://github.com/podofo/podofo/issues/275 Exploit Issue Tracking Vendor Advisory
https://vuldb.com/?ctiid.321227 Permissions Required VDB Entry
https://vuldb.com/?id.321227 Third Party Advisory VDB Entry
https://vuldb.com/?submit.632364 Exploit Third Party Advisory VDB Entry
https://vuldb.com/?submit.632365 Exploit Third Party Advisory VDB Entry
https://github.com/podofo/podofo/issues/275 Exploit Issue Tracking Vendor Advisory
https://vuldb.com/?submit.632364 Exploit Third Party Advisory VDB Entry
https://vuldb.com/?submit.632365 Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:podofo_project:podofo:1.1.0:dev:*:*:*:*:*:*

History

12 Sep 2025, 20:02

Type Values Removed Values Added
First Time Podofo Project podofo
Podofo Project
CPE cpe:2.3:a:podofo_project:podofo:1.1.0:dev:*:*:*:*:*:*
References () https://drive.google.com/file/d/1edJH17GAiK9R441Gjyj8tiV_2ptoL16U/view?usp=sharing - () https://drive.google.com/file/d/1edJH17GAiK9R441Gjyj8tiV_2ptoL16U/view?usp=sharing - Exploit
References () https://github.com/podofo/podofo/commit/22d16cb142f293bf956f66a4d399cdd65576d36c - () https://github.com/podofo/podofo/commit/22d16cb142f293bf956f66a4d399cdd65576d36c - Patch
References () https://github.com/podofo/podofo/issues/275 - () https://github.com/podofo/podofo/issues/275 - Exploit, Issue Tracking, Vendor Advisory
References () https://vuldb.com/?ctiid.321227 - () https://vuldb.com/?ctiid.321227 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.321227 - () https://vuldb.com/?id.321227 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.632364 - () https://vuldb.com/?submit.632364 - Exploit, Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.632365 - () https://vuldb.com/?submit.632365 - Exploit, Third Party Advisory, VDB Entry

25 Aug 2025, 20:24

Type Values Removed Values Added
References () https://github.com/podofo/podofo/issues/275 - () https://github.com/podofo/podofo/issues/275 -
References () https://vuldb.com/?submit.632364 - () https://vuldb.com/?submit.632364 -
References () https://vuldb.com/?submit.632365 - () https://vuldb.com/?submit.632365 -
Summary
  • (es) Se ha encontrado una falla en PoDoFo 1.1.0-dev. Este problema afecta a la función PdfTokenizer::DetermineDataType del archivo src/podofo/main/PdfTokenizer.cpp del componente PDF Dictionary Parser. La manipulación puede provocar use after free. Es posible lanzar el ataque en el host local. Se ha hecho público el exploit y puede que sea utilizado. Este parche se llama 22d16cb142f293bf956f66a4d399cdd65576d36c. Se debe aplicar un parche para solucionar este problema.

24 Aug 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-24 16:15

Updated : 2025-09-12 20:02


NVD link : CVE-2025-9394

Mitre link : CVE-2025-9394

CVE.ORG link : CVE-2025-9394


JSON object : View

Products Affected

podofo_project

  • podofo
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-416

Use After Free