A flaw has been found in PoDoFo 1.1.0-dev. This issue affects the function PdfTokenizer::DetermineDataType of the file src/podofo/main/PdfTokenizer.cpp of the component PDF Dictionary Parser. Executing manipulation can lead to use after free. It is possible to launch the attack on the local host. The exploit has been published and may be used. This patch is called 22d16cb142f293bf956f66a4d399cdd65576d36c. A patch should be applied to remediate this issue.
https://vuldb.com/?submit.632365
https://vuldb.com/?submit.632364
https://vuldb.com/?ctiid.321227
https://github.com/podofo/podofo/issues/275
https://github.com/podofo/podofo/commit/22d16cb142f293bf956f66a4d399cdd65576d36c
https://drive.google.com/file/d/1edJH17GAiK9R441Gjyj8tiV_2ptoL16U/view?usp=sharing
Published: 2025-08-24
Updated: 2025-08-25
Base Score: 4.3
Vector: CVSS2#AV:L/AC:L/Au:S/C:P/I:P/A:P
Severity: Medium
Base Score: 5.3
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Severity: Medium
Base Score: 1.9
Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
Severity: Low
EPSS: 0.00013