CVE-2025-15278Integer Overflow or Wraparound in Fontforge

Severity
7.8HIGHNVD
EPSS
0.1%
top 80.48%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 31

Description

FontForge GUtils XBM File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of pixels within XBM files. The issue results from the lack of proper validation of user-supplied data, which can result in an

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

CVEListV5fontforge/fontforge88de9b7dc76fbdef9069b7664ecc280f1c15ba2f
NVDfontforge/fontforge20251009

🔴Vulnerability Details

2
OSV
CVE-2025-15278: FontForge GUtils XBM File Parsing Integer Overflow Remote Code Execution Vulnerability2025-12-31
GHSA
GHSA-grcr-j565-jxh5: FontForge GUtils XBM File Parsing Integer Overflow Remote Code Execution Vulnerability2025-12-31

📋Vendor Advisories

2
Red Hat
fontforge: FontForge: Arbitrary Code Execution via XBM file parsing integer overflow2025-12-31
Debian
CVE-2025-15278: fontforge - FontForge GUtils XBM File Parsing Integer Overflow Remote Code Execution Vulnera...2025

🕵️Threat Intelligence

1
Wiz
CVE-2025-15278 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2025-15278 — Integer Overflow or Wraparound | cvebase