Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 09 Jan 2026 02:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cnblogs
Cnblogs pdfpatcher |
|
| CPEs | cpe:2.3:a:cnblogs:pdfpatcher:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Cnblogs
Cnblogs pdfpatcher |
Thu, 20 Nov 2025 19:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pdfpatcher
Pdfpatcher pdfpatcher |
|
| Vendors & Products |
Pdfpatcher
Pdfpatcher pdfpatcher |
Tue, 18 Nov 2025 05:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-611 | |
| Metrics |
cvssV3_1
|
Tue, 18 Nov 2025 01:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PDFPatcher thru 1.1.3.4663 executable's XML bookmark import functionality does not restrict XML external entity (XXE) references. The application uses .NET's XmlDocument class without disabling external entity resolution, enabling attackers to: Read arbitrary files from the victim's filesystem, exfiltrate sensitive data via out-of-band (OOB) HTTP requests, perform SSRF attacks against internal network resources, or cause a denial of service via entity expansion attacks. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-17T19:48:24.068Z
Reserved: 2025-10-27T00:00:00.000Z
Link: CVE-2025-63917
Updated: 2025-11-17T19:47:14.348Z
Status : Analyzed
Published: 2025-11-17T17:15:51.207
Modified: 2026-01-08T17:27:25.843
Link: CVE-2025-63917
No data.
OpenCVE Enrichment
Updated: 2025-11-20T19:31:05Z