Cyber Posture

CVE-2025-53085

HighPublic PoC

Published: 25 August 2025

Published
25 August 2025
Modified
03 November 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0039 59.8th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-53085 is a high-severity Heap-based Buffer Overflow (CWE-122) vulnerability in Sail Sail. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked in the top 40.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 requires timely flaw remediation, directly addressing the buffer overflow vulnerability by patching the SAIL library to prevent exploitation via malicious PSD files.

prevent

SI-16 implements memory protections such as ASLR and DEP that mitigate heap-based buffer overflows and prevent remote code execution even if the flaw is unpatched.

prevent

SI-10 enforces input validation on PSD files before decoding, reducing the risk of processing specially crafted images that trigger the heap overflow.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

Heap buffer overflow in PSD decoder enables client-side RCE via malicious file requiring user interaction.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A memory corruption vulnerability exists in the PSD RLE Decoding functionality of the SAIL Image Decoding Library v0.9.8. When decompressing the image data from a specially crafted .psd file, a heap-based buffer overflow can occur which allows for remote code…

more

execution. An attacker will need to convince the library to read a file to trigger this vulnerability.

Deeper analysisAI

CVE-2025-53085 is a memory corruption vulnerability in the PSD RLE Decoding functionality of the SAIL Image Decoding Library version 0.9.8. The issue arises during decompression of image data from a specially crafted .psd file, triggering a heap-based buffer overflow (CWE-122) that can enable remote code execution. Published on 2025-08-25, it affects applications or systems that incorporate this library for handling PSD files.

Attackers can exploit this vulnerability over a network with low complexity and no required privileges, though user interaction is necessary to convince a victim to process the malicious .psd file. Successful exploitation grants high-impact confidentiality, integrity, and availability effects (CVSS v3.1 base score: 8.8; AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), allowing arbitrary code execution in the context of the affected application.

The primary advisory from Talos Intelligence (TALOS-2025-2219) provides further technical details at https://talosintelligence.com/vulnerability_reports/TALOS-2025-2219. No specific patches or mitigations are detailed in the available information.

Details

CWE(s)

Affected Products

sail
sail
0.9.8

CVEs Like This One

CVE-2025-35984Same product: Sail Sail
CVE-2025-50129Same product: Sail Sail
CVE-2026-27168Same product: Sail Sail
CVE-2025-52456Same product: Sail Sail
CVE-2025-53510Same product: Sail Sail
CVE-2025-52930Same product: Sail Sail
CVE-2025-46407Same product: Sail Sail
CVE-2025-32468Same product: Sail Sail
CVE-2026-23719Shared CWE-122
CVE-2025-27173Shared CWE-122

References