CVE-2025-0907
Published: 11 February 2025
Summary
CVE-2025-0907 is a high-severity Out-of-bounds Read (CWE-125) vulnerability in Pdf-Xchange Pdf-Xchange Editor. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 36.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the lack of proper validation of user-supplied JB2 file data that causes the out-of-bounds read.
Implements memory safeguards to prevent exploitation of the out-of-bounds read past allocated objects.
Ensures timely identification, reporting, and remediation of the specific JB2 parsing flaw in PDF-XChange Editor.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Out-of-bounds read in client-side PDF/JB2 parser enables exploitation for client execution via malicious file or web page (user interaction required).
NVD Description
PDF-XChange Editor JB2 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a…
more
malicious page or open a malicious file. The specific flaw exists within the parsing of JB2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-25435.
Deeper analysisAI
CVE-2025-0907 is a JB2 file parsing out-of-bounds read information disclosure vulnerability in PDF-XChange Editor. The flaw occurs due to a lack of proper validation of user-supplied data during JB2 file parsing, resulting in a read past the end of an allocated object. This issue affects installations of PDF-XChange Editor and was publicly disclosed on 2025-02-11, with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) and is associated with CWE-125.
Remote attackers can exploit this vulnerability to disclose sensitive information, but user interaction is required, such as the target visiting a malicious web page or opening a malicious file. No privileges are needed (PR:N), and the attack is network-accessible (AV:N) with low complexity (AC:L). While primarily enabling information disclosure, the vulnerability can be leveraged in conjunction with other flaws to achieve arbitrary code execution in the context of the current process.
The Zero Day Initiative advisory (ZDI-25-069, ZDI-CAN-25435) provides further details at https://www.zerodayinitiative.com/advisories/ZDI-25-069/.
Details
- CWE(s)