Skip to main content

PDF-XChange Editor importDataObject() Deinal of Service Vulnerability

← Back to Advisories
CVE Number CVE-2025-64085
Vendor PDF-XChange
Credit Lee Kwang Hui

Description

In PDF-XChange Editor 10.7.2.400, an Access Violation occurs when the `this.importDataObject` method is invoked. If a user opens a maliciously crafted PDF file, the application terminates immediately, resulting in a Denial-of-Service condition.

Details

The instruction at which the vulnerability occurs is as follows:

(591c.504c): Access violation - code c0000005 (!!! second chance !!!)
PDFXEditCore_x64!PXV_GetInstance+0x668664:
00007fff`be028964 488b07          mov     rax,qword ptr [rdi] ds:00000000`00000000=????????????????

This issue occurs when the second argument of importDataObject(name, pathOrUrl) contains either a URI scheme or a path that includes a single backslash. If the argument contains a colon (:), the internal scheme-validation logic is invoked. When unsupported or untrusted schemes such as about: or javascript: are supplied—or when this.URL is passed—the scheme parser returns an ERROR_OBJECT, which subsequently leads to a null pointer dereference.

In the case of a path containing a single backslash (e.g., "C:\test.txt"), JavaScript string-escaping corrupts the path, causing the file-open operation to fail and again resulting in an ERROR_OBJECT that triggers a null pointer dereference. Notably, when this.URL is used as the second argument, the application terminates immediately without requiring any user interaction.

Timeline

2025-10-19 - Vulnerability reported to Vendor

- Vendor Patch Release