CVE-2025-15273Stack-based Buffer Overflow in Fontforge

Severity
8.8HIGHNVD
EPSS
0.2%
top 60.75%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 31

Description

FontForge PFB File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PFB files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages3 packages

CVEListV5fontforge/fontforgeaca4f524c6cb14cdc7bc4cd493492a33f5154797
NVDfontforge/fontforge2025-11-17

🔴Vulnerability Details

2
GHSA
GHSA-w327-296g-78wc: FontForge PFB File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability2025-12-31
OSV
CVE-2025-15273: FontForge PFB File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability2025-12-31

📋Vendor Advisories

2
Red Hat
fontforge: FontForge: Remote Code Execution via PFB File Parsing Stack-based Buffer Overflow2025-12-31
Debian
CVE-2025-15273: fontforge - FontForge PFB File Parsing Stack-based Buffer Overflow Remote Code Execution Vul...2025

🕵️Threat Intelligence

1
Wiz
CVE-2025-15273 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2025-15273 — Stack-based Buffer Overflow | cvebase