CVE-2025-7993
NixOS vulnerability analysis and mitigation

Overview

Ashlar-Vellum Cobalt contains a Use-After-Free vulnerability in the parsing of LI files that allows remote attackers to execute arbitrary code on affected installations. The vulnerability was discovered and reported on March 12, 2025, and was assigned CVE-2025-7993. User interaction is required to exploit this vulnerability, specifically requiring the target to visit a malicious page or open a malicious file (Zero Day Initiative).

Technical details

The vulnerability stems from the lack of validating the existence of an object prior to performing operations on the object during LI file parsing. This Use-After-Free (CWE-416) vulnerability has been assigned a CVSS v3.0 base score of 7.8 (High), with the vector string CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. The vulnerability affects Ashlar-Vellum Cobalt version 12.0.1204.91 (Zero Day Initiative).

Impact

An attacker who successfully exploits this vulnerability can execute arbitrary code in the context of the current process. This could potentially lead to complete system compromise, allowing the attacker to execute malicious code, access sensitive information, or take control of the affected system (Zero Day Initiative).

Mitigation and workarounds

Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the product. As of July 30, 2025, no official patch has been released by the vendor (Zero Day Initiative).

Community reactions

The vulnerability was discovered by security researcher Rocco Calvi (@TecR0c) with TecSecurity. Despite multiple follow-ups from ZDI on May 2 and June 19, 2025, the vendor's response was limited to acknowledging the initial report, leading to the vulnerability being published as a 0-day advisory (Zero Day Initiative).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-14330CRITICAL9.8
  • NixOSNixOS
  • rhel10::firefox-flatpak
NoYesDec 09, 2025
CVE-2025-14329HIGH8.8
  • NixOSNixOS
  • cpe:2.3:a:mozilla:firefox
NoYesDec 09, 2025
CVE-2025-14333HIGH8.1
  • NixOSNixOS
  • firefox
NoYesDec 09, 2025
CVE-2025-14332HIGH7.3
  • NixOSNixOS
  • cpe:2.3:a:mozilla:firefox
NoYesDec 09, 2025
CVE-2025-14331MEDIUM6.5
  • NixOSNixOS
  • rhel10::thunderbird-flatpak
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management