Out-of-Bounds Write Vulnerability in DjVuLibre by DjVu Group
CVE-2025-53367

8.4HIGH

Key Information:

Vendor

Djvunet

Status
Vendor
CVE Published:
3 July 2025

Badges

📈 Score: 285👾 Exploit Exists🟡 Public PoC

What is CVE-2025-53367?

CVE-2025-53367 is an out-of-bounds write vulnerability found in DjVuLibre, a widely used open-source software implementation of the DjVu document and image format. This vulnerability, which exists in versions prior to 3.5.29, stems from the MMRDecoder::scanruns method failing to properly validate the xr pointer, thereby allowing writes outside the bounds of the allocated memory buffer. Such a condition can lead to heap memory corruption, posing serious risks to the stability and integrity of applications relying on DjVuLibre for document processing. This flaw could be exploited by attackers to manipulate memory in a way that could lead to arbitrary code execution or system crashes, severely impacting organizations that depend on this software for handling DjVu files.

Potential impact of CVE-2025-53367

  1. Arbitrary Code Execution: The vulnerability can allow an attacker to manipulate the heap memory, leading to arbitrary code execution. This could enable unauthorized control over the affected systems, allowing attackers to execute malicious payloads.

  2. System Instability and Crashes: Exploitation of the out-of-bounds write flaw could result in significant instability, leading to application crashes or system downtime. This may interrupt business operations, resulting in operational losses and impacting user experience.

  3. Data Integrity Compromise: Given the nature of the vulnerability, there is a risk that sensitive documents processed by DjVuLibre could be altered or corrupted. This compromise of data integrity can have severe repercussions for organizations that handle sensitive or critical information in DjVu format.

Affected Version(s)

DjVuLibre < 3.5.29

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
8.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.