Heap-based Buffer Overflow in FontForge Allows Remote Code Execution
CVE-2025-15279

7.8HIGH

Key Information:

Vendor

Fontforge

Status
Vendor
CVE Published:
31 December 2025

What is CVE-2025-15279?

The vulnerability in FontForge relates to improper handling of BMP file parsing, allowing attackers to exploit a heap-based buffer overflow. By manipulating the pixel data, an attacker can execute arbitrary code if the user visits a malicious page or opens an infected BMP file. The lack of rigorous checks on the length of data being copied into a heap buffer presents a significant risk, as it enables remote code execution in the context of the logged-in user. To mitigate this risk, it's crucial to ensure users are cautious about the sources of files they open.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

FontForge 387146a241b36bcdf6ce229c5a3fe367ed3854a1

References

CVSS V3.0

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.