CVE-2025-14404

7.0 HIGH

📋 TL;DR

PDFsam Enhanced has a remote code execution vulnerability in its XLS file processing. Attackers can execute arbitrary code by tricking users into opening malicious XLS files. This affects all users of vulnerable PDFsam Enhanced versions.

💻 Affected Systems

Products:
  • PDFsam Enhanced
Versions: All versions prior to the patched release
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with XLS file processing enabled are vulnerable. The vulnerability requires user interaction to open a malicious file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the user's system, data theft, ransomware deployment, and lateral movement within the network.

🟠

Likely Case

Malware installation leading to data exfiltration, credential theft, and persistence on the compromised system.

🟢

If Mitigated

Limited impact due to application sandboxing, user privilege restrictions, and network segmentation preventing lateral movement.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction but is technically simple once a malicious file is opened. The ZDI advisory suggests weaponization is likely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific version

Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-25-1092/

Restart Required: Yes

Instructions:

1. Visit the PDFsam Enhanced official website or update mechanism
2. Download and install the latest version
3. Restart the application and any related services
4. Verify the update was successful

🔧 Temporary Workarounds

Disable XLS file association

all

Remove PDFsam Enhanced as the default handler for XLS files to prevent automatic opening

Windows: Control Panel > Default Programs > Set Associations
Linux: update-alternatives --config x-scheme-handler/xls
macOS: Right-click XLS file > Get Info > Open With > Change All

Application sandboxing

all

Run PDFsam Enhanced in a restricted environment to limit potential damage

Windows: Use Windows Sandbox or AppLocker rules
Linux: Use Firejail or SELinux/AppArmor policies
macOS: Use macOS Sandbox profiles

🧯 If You Can't Patch

  • Implement application whitelisting to block PDFsam Enhanced execution entirely
  • Deploy network segmentation to isolate systems running vulnerable versions from critical assets

🔍 How to Verify

Check if Vulnerable:

Check PDFsam Enhanced version against the patched version in vendor advisory. If version is older, system is vulnerable.

Check Version:

PDFsam Enhanced: Help > About or check application properties. Command line: pdfsam-enhanced --version (if available)

Verify Fix Applied:

Verify installed version matches or exceeds the patched version listed in vendor advisory. Test with safe XLS files to ensure proper warning behavior.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process spawning from PDFsam Enhanced
  • XLS file processing errors or crashes
  • Network connections initiated by PDFsam Enhanced to unexpected destinations

Network Indicators:

  • Outbound connections from PDFsam Enhanced to command and control servers
  • DNS requests for suspicious domains following XLS file opening

SIEM Query:

process_name:"pdfsam-enhanced" AND (process_spawn:* OR network_connection:*)

🔗 References

📤 Share & Export