CVE-2025-15269Use After Free in Fontforge

CWE-416Use After Free7 documents7 sources
Severity
8.8HIGHNVD
EPSS
0.4%
top 41.37%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 31

Description

FontForge SFD File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of SFD files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages3 packages

CVEListV5fontforge/fontforgeaca4f524c6cb14cdc7bc4cd493492a33f5154797
NVDfontforge/fontforge2025-11-17

🔴Vulnerability Details

2
OSV
CVE-2025-15269: FontForge SFD File Parsing Use-After-Free Remote Code Execution Vulnerability2025-12-31
GHSA
GHSA-8j84-3r78-7j5x: FontForge SFD File Parsing Use-After-Free Remote Code Execution Vulnerability2025-12-31

📋Vendor Advisories

2
Red Hat
fontforge: FontForge: Remote Code Execution via Use-After-Free in SFD file parsing2025-12-31
Debian
CVE-2025-15269: fontforge - FontForge SFD File Parsing Use-After-Free Remote Code Execution Vulnerability. T...2025

🕵️Threat Intelligence

1
Wiz
CVE-2025-15269 Impact, Exploitability, and Mitigation Steps | Wiz

💬Community

1
Bugzilla
CVE-2025-15269 fontforge: FontForge: Remote Code Execution via Use-After-Free in SFD file parsing2025-12-31
CVE-2025-15269 — Use After Free in Fontforge | cvebase