MuPDF before 1.27 contains an ANSI injection vulnerability in mutool that allows attackers to inject arbitrary ANSI escape sequences through crafted PDF metadata fields. Attackers can embed malicious ANSI escape codes in PDF metadata that are passed unsanitized to terminal output when running mutool info, enabling them to manipulate terminal display for social engineering attacks such as presenting fake prompts or spoofed commands.
https://www.vulncheck.com/advisories/mupdf-mutool-ansi-injection-via-metadata
https://github.com/ArtifexSoftware/mupdf/releases/tag/1.27.0
https://github.com/ArtifexSoftware/mupdf/commit/0f17d789fe8c29b41e47663be82514aaca3a4dfb
Published: 2026-04-16
Updated: 2026-04-17
Base Score: 2.1
Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:P/A:N
Severity: Low
Base Score: 3.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Severity: Low
Base Score: 4.8
Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
Severity: Medium
EPSS: 0.00012