Name | CVE-2025-54869 |
Description | FPDI is a collection of PHP classes that facilitate reading pages from existing PDF documents and using them as templates in FPDF. In versions 2.6.2 and below, any application that uses FPDI to process user-supplied PDF files is at risk, causing a Denial of Service (DoS) vulnerability. An attacker can upload a small, malicious PDF file that will cause the server-side script to crash due to memory exhaustion. Repeated attacks can lead to sustained service unavailability. This issue is fixed in version 2.6.3. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
icingaweb2-module-pdfexport (PTS) | bullseye | 0.9.0-1.1 | vulnerable |
| bookworm | 0.10.2+dfsg1-2 | vulnerable |
| forky, sid, trixie | 0.11.0+dfsg-3 | vulnerable |
The information below is based on the following data on fixed versions.
Notes
https://github.com/Setasign/FPDI/security/advisories/GHSA-jxhh-4648-vpp3
https://github.com/Setasign/FPDI/commit/ba671ba9221cffd32c2dda87316c19f522a1c5f0
icingaweb2-module-pdfexport embedds FPDI but likely not affected by the CVE, as
the CVE is on the PDF parser while importing an untrusted PDF. icingaweb2-module-pdfexport
exports a controlled PDF.