EUVD-2025-209415

| CVE-2025-66769 HIGH
2026-04-13 mitre GHSA-hf73-7qvc-m78v
7.5
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

2
Analysis Generated
Apr 15, 2026 - 12:29 vuln.today
CVSS Changed
Apr 13, 2026 - 20:22 NVD
7.5 (None) 7.5 (HIGH)

DescriptionNVD

A NULL pointer dereference in Nitro PDF Pro for Windows v14.41.1.4 allows attackers to cause a Denial of Service (DoS) via a crafted XFA packet.

AnalysisAI

Nitro PDF Pro for Windows version 14.41.1.4 crashes when processing maliciously crafted XFA (XML Forms Architecture) packets due to a NULL pointer dereference, enabling remote denial-of-service attacks without authentication. An attacker can deliver a weaponized PDF containing the crafted XFA packet, causing the application to terminate when opened. EPSS exploitation probability is very low (0.01%, 2nd percentile), no active exploitation confirmed (not in CISA KEV), and no public exploit code identified at time of analysis. Despite CVSS 7.5 (High), real-world risk is limited to availability impact only - no code execution, data theft, or privilege escalation possible.

Technical ContextAI

XFA (XML Forms Architecture) is an Adobe XML-based form specification embedded in PDF documents, used for dynamic form rendering and data processing. Nitro PDF Pro's XFA parser fails to validate pointer references before dereferencing them when processing specially crafted XFA packet structures. CWE-476 (NULL Pointer Dereference) occurs when code attempts to access memory via a pointer that has not been initialized or has been explicitly set to NULL, typically causing immediate application crashes on modern operating systems with memory protection. The vulnerability exists in the parsing logic that handles XFA elements within PDF documents, likely during the deserialization or DOM construction phase when the application processes the XFA template stream. No CPE product identifier was provided beyond generic placeholder values, but the vulnerability specifically affects Nitro PDF Pro version 14.41.1.4 for Windows platforms.

RemediationAI

Upgrade Nitro PDF Pro to the latest version available from the vendor at https://www.gonitro.com/, verifying the release notes confirm resolution of CVE-2025-66769 or XFA parsing vulnerabilities. No vendor-released patch or specific fix version number was identified in available data sources at time of analysis. As interim mitigation, organizations can implement PDF file scanning/sanitization at email gateways to detect and strip XFA content from incoming documents, deploy application-level firewall rules to monitor Nitro PDF Pro process behavior for abnormal terminations, or consider alternative PDF readers that do not support XFA rendering for users who do not require dynamic forms functionality. Restrict processing of PDFs from untrusted sources and educate users on the risks of opening unsolicited PDF attachments, particularly those claiming to contain interactive forms.

Share

EUVD-2025-209415 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy