CVE-2025-7620
Published: 14 July 2025
Summary
CVE-2025-7620 is a high-severity Download of Code Without Integrity Check (CWE-494) vulnerability in Org (inferred from references). Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Drive-by Compromise (T1189); ranked at the 48.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 CM-7 (Least Functionality) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely patching and remediation of the specific RCE flaw in the cross-browser document creation component.
Deploys malicious code protection mechanisms to scan and block arbitrary programs downloaded and executed via exploitation of the vulnerable component.
Enforces least functionality by disabling or restricting the non-essential document creation component vulnerable to remote exploitation from malicious websites.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vuln enables drive-by compromise via malicious site visit (T1189), user-triggered download/execution of arbitrary code (T1105 + T1204).
NVD Description
The cross-browser document creation component produced by Digitware System Integration Corporation has a Remote Code Execution vulnerability. If a user visits a malicious website while the component is active, remote attackers can cause the system to download and execute arbitrary…
more
programs.
Deeper analysisAI
CVE-2025-7620 is a Remote Code Execution vulnerability affecting the cross-browser document creation component produced by Digitware System Integration Corporation. Published on 2025-07-14, the flaw carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) and maps to CWE-494.
Remote attackers can exploit the vulnerability when a user visits a malicious website while the component is active. No privileges are required, but user interaction is necessary. Successful exploitation enables attackers to cause the affected system to download and execute arbitrary programs, leading to high impacts on confidentiality, integrity, and availability.
Advisories from TWCERT provide further details on the vulnerability, available at https://www.twcert.org.tw/en/cp-139-10242-5ab42-2.html and https://www.twcert.org.tw/tw/cp-132-10241-2ec07-1.html.
Details
- CWE(s)