CVE-2025-2231
PDF-XChange Editor vulnerability analysis and mitigation

Overview

PDF-XChange Editor RTF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability (CVE-2025-2231) was discovered and disclosed on March 12, 2025. This vulnerability affects PDF-XChange Editor installations and requires user interaction to exploit, specifically when opening a malicious RTF file. The vulnerability stems from improper validation of user-supplied data during RTF file parsing (Zero Day Initiative).

Technical details

The vulnerability is classified with a CVSS v3.0 base score of 7.8 (HIGH) with the vector string CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. The specific flaw exists within the parsing of RTF files, where improper validation of user-supplied data can result in a read past the end of an allocated buffer. The vulnerability is tracked as CWE-125 (Out-of-bounds Read) (Zero Day Initiative).

Impact

If successfully exploited, this vulnerability allows attackers to execute arbitrary code in the context of the current process on affected installations of PDF-XChange Editor. The high CVSS score indicates potential severe impacts on system confidentiality, integrity, and availability (Zero Day Initiative).

Mitigation and workarounds

PDF-XChange has released version 10.5.2.395 to address this vulnerability. Users of affected versions (PDF-XChange Editor 10.5.1.394, PDF-Tools 10.5.1.394, and PDF-XChange PRO 10.5.1.394) should upgrade to the latest version (PDF-XChange Security Bulletin).

Community reactions

The vulnerability was discovered by Rocco Calvi (@TecR0c) with TecSecurity, working in collaboration with Trend Micro's Zero Day Initiative. The coordinated disclosure process involved reporting to the vendor on October 11, 2024, with the public advisory release on March 12, 2025 (Zero Day Initiative).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management