CVE-2025-54869

NameCVE-2025-54869
DescriptionFPDI is a collection of PHP classes that facilitate reading pages from existing PDF documents and using them as templates in FPDF. In versions 2.6.2 and below, any application that uses FPDI to process user-supplied PDF files is at risk, causing a Denial of Service (DoS) vulnerability. An attacker can upload a small, malicious PDF file that will cause the server-side script to crash due to memory exhaustion. Repeated attacks can lead to sustained service unavailability. This issue is fixed in version 2.6.3.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
icingaweb2-module-pdfexport (PTS)bullseye0.9.0-1.1vulnerable
bookworm0.10.2+dfsg1-2vulnerable
forky, sid, trixie0.11.0+dfsg-3vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
icingaweb2-module-pdfexportsource(unstable)(unfixed)unimportant

Notes

https://github.com/Setasign/FPDI/security/advisories/GHSA-jxhh-4648-vpp3
https://github.com/Setasign/FPDI/commit/ba671ba9221cffd32c2dda87316c19f522a1c5f0
icingaweb2-module-pdfexport embedds FPDI but likely not affected by the CVE, as
the CVE is on the PDF parser while importing an untrusted PDF. icingaweb2-module-pdfexport
exports a controlled PDF.

Search for package or bug name: Reporting problems