CVE-2025-15280

NameCVE-2025-15280
DescriptionFontForge SFD File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of SFD files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28525.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1124487

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
fontforge (PTS)bullseye (security), bullseye1:20201107~dfsg-4+deb11u1vulnerable
bookworm, bookworm (security)1:20230101~dfsg-1.1~deb12u1vulnerable
trixie1:20230101~dfsg-4vulnerable
forky, sid1:20230101~dfsg-8vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
fontforgesource(unstable)(unfixed)1124487

Notes

https://www.zerodayinitiative.com/advisories/ZDI-25-1188/

Search for package or bug name: Reporting problems