Argument Sanitization Weakness in Artifex Ghostscript Software
CVE-2025-48708

4MEDIUM

Key Information:

Vendor

Artifex

Vendor
CVE Published:
23 May 2025

Badges

📈 Score: 527👾 Exploit Exists🟡 Public PoC

What is CVE-2025-48708?

CVE-2025-48708 is a vulnerability found in the Artifex Ghostscript software, specifically within the gs_lib_ctx_stash_sanitized_arg function located in the base/gslibctx.c file. Ghostscript is primarily used to process and render documents in various formats, particularly PDF. This vulnerability arises from a lack of argument sanitization for certain cases, leading to a significant flaw where sensitive information, including passwords, can be embedded in PDF documents in cleartext form. Organizations utilizing Ghostscript for document management and manipulation could face serious risks, as the exposure of passwords in this manner can lead to unauthorized access, data breaches, and potential compliance violations.

Potential impact of CVE-2025-48708

  1. Data Leakage: The vulnerability allows sensitive information such as passwords to be stored in cleartext within generated PDF documents, increasing the risk of data exposure if these documents are improperly accessed or shared.

  2. Unauthorized Access: With passwords embedded in cleartext, malicious actors could exploit this vulnerability to gain unauthorized access to secured resources, potentially leading to further exploitation or data compromise within an organization.

  3. Compliance Risks: Organizations may face significant compliance issues due to the mishandling of sensitive information under privacy regulations. The exposure of credentials could lead to non-compliance with standards such as GDPR or HIPAA, resulting in legal repercussions and financial penalties.

Affected Version(s)

Ghostscript 0 < 10.05.1

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.