CVE-2025-43718
Linux Debian vulnerability analysis and mitigation

Overview

CVE-2025-43718 affects Poppler versions 24.06.1 through 25.x before 25.04.0. The vulnerability was discovered and disclosed in early October 2025, impacting PDF rendering library functionality across multiple Linux distributions. The vulnerability allows stack consumption and SIGSEGV (segmentation fault) through deeply nested structures within PDF metadata, specifically in the GTS_PDFEVersion component (Ubuntu Security, Debian Security).

Technical details

The vulnerability occurs in Dict::lookup, Catalog::getMetadata, and associated functions in PDFDoc, involving deep recursion in the regex executor (std::__detail::_Executor). The issue manifests when processing deeply nested structures within PDF metadata, particularly when handling regular expressions for long pdfsubver strings. The vulnerability has been assigned a CVSS 3.1 Base Score of 6.5 (Medium), with attack vector being Network, low attack complexity, requiring no privileges but user interaction, and having high availability impact (Ubuntu Security).

Impact

If exploited, this vulnerability can cause the Poppler library to crash, resulting in a denial of service condition. When a user or automated system is tricked into opening a specially crafted PDF document, the application can experience a segmentation fault, disrupting normal operations (Ubuntu Security Notice).

Mitigation and workarounds

The vulnerability has been fixed in Poppler version 25.04.0 through commit f54b815. Multiple Linux distributions have released security updates to address this issue. Ubuntu has released fixes for versions 25.04 (plucky), 24.04 LTS (noble), and 22.04 LTS (jammy). Users are advised to update their systems to the latest package versions through standard system updates (Ubuntu Security Notice, Debian Security).

Additional resources


SourceThis report was generated using AI

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22857MEDIUM6.8
  • Linux DebianLinux Debian
  • freerdp-plugins
NoNoJan 14, 2026
CVE-2026-22856MEDIUM6.8
  • Linux DebianLinux Debian
  • freerdp2
NoNoJan 14, 2026
CVE-2026-22859MEDIUM5.6
  • Linux DebianLinux Debian
  • freerdp3
NoNoJan 14, 2026
CVE-2026-22858MEDIUM5.6
  • Linux DebianLinux Debian
  • freerdp3
NoNoJan 14, 2026
CVE-2026-22036LOW3.7
  • JavaScriptJavaScript
  • node-undici
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management