CVE-2025-27837
Published: 25 March 2025
Summary
CVE-2025-27837 is a critical-severity Path Traversal (CWE-22) vulnerability in Artifex Ghostscript. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 38.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the path traversal flaw in Ghostscript by requiring timely patching to version 10.05.0 or later.
Validates inputs to Ghostscript to detect and block malformed paths with invalid UTF-8 characters that enable arbitrary file access.
Enforces access control policies to restrict Ghostscript processes from accessing arbitrary files outside authorized directories.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal vulnerability enables remote arbitrary file access on systems processing untrusted inputs, directly facilitating exploitation of public-facing applications (T1190) and data collection from the local file system (T1005).
NVD Description
An issue was discovered in Artifex Ghostscript before 10.05.0. Access to arbitrary files can occur through a truncated path with invalid UTF-8 characters, for base/gp_mswin.c and base/winrtsup.cpp.
Deeper analysisAI
CVE-2025-27837 is a path traversal vulnerability (CWE-22) discovered in Artifex Ghostscript versions before 10.05.0. The flaw resides in the base/gp_mswin.c and base/winrtsup.cpp components, where a truncated path containing invalid UTF-8 characters enables access to arbitrary files.
Attackers can exploit this vulnerability remotely over the network (AV:N) with low attack complexity (AC:L), requiring no privileges (PR:N) or user interaction (UI:N), and without changing scope (S:U). Achieving a CVSS v3.1 base score of 9.8, exploitation results in high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), allowing unauthorized access to arbitrary files on affected Windows systems processing malicious inputs.
The Ghostscript bug tracker at https://bugs.ghostscript.com/show_bug.cgi?id=708238 documents the issue, with mitigation achieved by upgrading to Ghostscript 10.05.0 or later.
Details
- CWE(s)