CVE-2025-53964

9.6 CRITICAL

📋 TL;DR

GoldenDict 1.5.0 and 1.5.1 contain an exposed dangerous method that allows arbitrary file read and write operations when a user adds a malicious dictionary and searches for terms within it. This vulnerability affects all users of these versions who add third-party dictionaries. Attackers can craft dictionaries to exploit this flaw.

💻 Affected Systems

Products:
  • GoldenDict
Versions: 1.5.0 through 1.5.1
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when adding a crafted dictionary file and performing searches. All default configurations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via arbitrary file write leading to remote code execution, data theft, or system destruction.

🟠

Likely Case

Local file disclosure and modification, potentially leading to privilege escalation or data corruption.

🟢

If Mitigated

Limited impact if users only add trusted dictionaries from verified sources.

🌐 Internet-Facing: LOW (GoldenDict is typically a desktop application, not internet-facing)
🏢 Internal Only: HIGH (Exploitation requires user interaction but can lead to significant local impact)

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction (adding dictionary and searching). Proof-of-concept code is publicly available in the GitHub reference.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.5.2 or later

Vendor Advisory: https://github.com/goldendict/goldendict/releases

Restart Required: Yes

Instructions:

1. Download GoldenDict 1.5.2 or later from the official GitHub releases page. 2. Uninstall the vulnerable version. 3. Install the patched version. 4. Restart the application.

🔧 Temporary Workarounds

Restrict dictionary sources

all

Only add dictionaries from trusted, verified sources. Avoid adding unknown or untrusted dictionary files.

Disable automatic dictionary loading

all

Configure GoldenDict to not automatically load new dictionaries and require manual approval.

🧯 If You Can't Patch

  • Uninstall GoldenDict 1.5.0-1.5.1 and use alternative dictionary software
  • Implement application whitelisting to prevent execution of GoldenDict

🔍 How to Verify

Check if Vulnerable:

Check GoldenDict version in Help → About. If version is 1.5.0 or 1.5.1, the system is vulnerable.

Check Version:

goldendict --version (Linux/macOS) or check About dialog (Windows)

Verify Fix Applied:

After updating, verify version is 1.5.2 or later in Help → About.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns from GoldenDict process
  • Addition of unfamiliar dictionary files

Network Indicators:

  • Downloads of dictionary files from untrusted sources

SIEM Query:

Process:goldendict AND (FileCreate OR FileWrite) WHERE path NOT LIKE '%goldendict%'

🔗 References

📤 Share & Export