PDFPatcher thru 1.1.3.4663 executable's XML bookmark import functionality does not restrict XML external entity (XXE) references. The application uses .NET's XmlDocument class without disabling external entity resolution, enabling attackers to: Read arbitrary files from the victim's filesystem, exfiltrate sensitive data via out-of-band (OOB) HTTP requests, perform SSRF attacks against internal network resources, or cause a denial of service via entity expansion attacks.
Metrics
Affected Vendors & Products
References
History
Thu, 20 Nov 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pdfpatcher
Pdfpatcher pdfpatcher |
|
| Vendors & Products |
Pdfpatcher
Pdfpatcher pdfpatcher |
Mon, 17 Nov 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-611 | |
| Metrics |
cvssV3_1
|
Mon, 17 Nov 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PDFPatcher thru 1.1.3.4663 executable's XML bookmark import functionality does not restrict XML external entity (XXE) references. The application uses .NET's XmlDocument class without disabling external entity resolution, enabling attackers to: Read arbitrary files from the victim's filesystem, exfiltrate sensitive data via out-of-band (OOB) HTTP requests, perform SSRF attacks against internal network resources, or cause a denial of service via entity expansion attacks. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-11-17T00:00:00.000Z
Updated: 2025-11-17T19:48:24.068Z
Reserved: 2025-10-27T00:00:00.000Z
Link: CVE-2025-63917
Updated: 2025-11-17T19:47:14.348Z
Status : Awaiting Analysis
Published: 2025-11-17T17:15:51.207
Modified: 2025-11-18T14:06:29.817
Link: CVE-2025-63917
No data.