Memory Corruption Vulnerability in Radare2 by Radare Org
CVE-2025-5647

2LOW

Key Information:

Vendor

Radare Org

Status
Vendor
CVE Published:
5 June 2025

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2025-5647?

A memory corruption vulnerability exists in Radare2 version 5.9.9 and the master branch, specifically affecting the r_cons_context_break_pop function within the radiff2 component. This vulnerability is triggered through manipulation of the experimental argument -T, which is noted to be 'crashy.' Although exploitation requires local access and is technically complex, public disclosures indicate that it is feasible. Users are advised to implement the provided patch (5705d99cc1f23f36f9a84aab26d1724010b97798) to mitigate risks. Recent updates have noted that the race condition may not present significant issues unless AddressSanitizer (asan) is in use, and a warning has been added accordingly.

Affected Version(s)

Radare2 5.9.9

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
2
Severity:
LOW
Confidentiality:
None
Integrity:
None
Availability:
Low
Attack Vector:
Local
Attack Complexity:
High
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

rootsec (VulDB User)
.
CVE-2025-5647 : Memory Corruption Vulnerability in Radare2 by Radare Org