EUVD-2025-19153

| CVE-2025-6651 HIGH
2025-06-25 [email protected]
7.8
CVSS 3.0
Share

CVSS Vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 15, 2026 - 23:19 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 23:19 euvd
EUVD-2025-19153
CVE Published
Jun 25, 2025 - 22:15 nvd
HIGH 7.8

Description

PDF-XChange Editor JP2 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26713.

Analysis

CVE-2025-6651 is a critical out-of-bounds write vulnerability in PDF-XChange Editor's JP2 image file parser that allows remote code execution when a user opens a malicious PDF or visits a malicious webpage containing an embedded JP2 file. The vulnerability (CVSS 7.8, formerly ZDI-CAN-26713) requires user interaction but results in arbitrary code execution with full process privileges. No public exploit code availability or active KEV status has been confirmed at this time, though the high CVSS and straightforward attack vector (local file opening) suggest meaningful real-world risk.

Technical Context

PDF-XChange Editor is a commercial PDF manipulation application that includes support for various image formats embedded within PDF documents, including JPEG2000 (JP2) images. The vulnerability exists in the JP2 file parser module, which fails to properly validate user-supplied data during image decoding. This results in a CWE-787 (Out-of-bounds Write) condition where the parser writes data past the end of an allocated heap or stack buffer. JPEG2000 parsing is computationally complex with numerous tile, component, and resolution level parameters that can be maliciously crafted. The lack of bounds checking before writing parsed image data creates a classic buffer overflow vulnerability that can be leveraged to corrupt adjacent memory structures and achieve code execution within the PDF-XChange Editor process context.

Affected Products

PDF-XChange Editor (specific versions not disclosed in the provided description). The vulnerability identifier ZDI-CAN-26713 references the Trend Micro Zero Day Initiative disclosure, suggesting this was discovered through their coordinated disclosure program. Affected CPE would be expected in form: cpe:2.3:a:tracker-software:pdf-xchange-editor:*:*:*:*:*:*:*:* with specific version constraints to be determined from vendor advisory. Tracker Software Products (the vendor) has not released version information in the provided data; check Tracker Software advisories and NIST NVD for affected version ranges.

Remediation

Patch availability and specific patched versions have not been provided in the source data. Recommended actions: (1) Contact Tracker Software Products directly or visit their security advisories page for the patched version; (2) As interim mitigation, disable or restrict JP2 image rendering in PDF-XChange Editor if user preferences allow; (3) Educate users not to open PDF files from untrusted sources, particularly those containing images; (4) Implement application whitelisting or sandboxing of PDF-XChange Editor if feasible; (5) Monitor for vendor security bulletin at tracker-software.com; (6) Apply patch immediately upon availability given RCE severity. No known workaround exists for users who must process untrusted PDFs—patching is required.

Priority Score

39
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +39
POC: 0

Share

EUVD-2025-19153 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy