CVE-2025-25940
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Tags
Description
VisiCut 2.1 allows code execution via Insecure XML Deserialization in the loadPlfFile method of VisicutModel.java.
Analysis
VisiCut 2.1 allows remote code execution through insecure XML deserialization in the loadPlfFile method. An attacker who can supply a crafted PLF file can execute arbitrary Java code on the victim's machine. A public PoC exploit exists and no patch is available.
Technical Context
The loadPlfFile method in VisicutModel.java processes PLF files (XML-based project files) using Java deserialization without restricting which classes can be instantiated (CWE-502). Gadget chains in common Java libraries can be leveraged for code execution.
Affected Products
VisiCut 2.1
Remediation
Avoid opening PLF files from untrusted sources. Run VisiCut in a sandboxed environment. Monitor the VisiCut project for security updates.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today