### Vulnerability Key Information #### Basic Information - **Title**: (0Day) pdfforge PDF Architect CBZ File Parsing Directory Traversal Remote Code Execution Vulnerability - **ID**: - ZDI-25-1077 - ZDI-CAN-27514 - **CVE ID**: CVE-2025-14420 - **CVSS Score**: 7.8, AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H - **Affected Vendor**: pdfforge - **Affected Product**: PDF Architect #### Vulnerability Details - **Description**: This vulnerability allows remote attackers to execute arbitrary code on affected pdfforge PDF Architect installations. User interaction is required; the target must access a malicious page or open a malicious file to exploit this vulnerability. - **Specific Issue**: There is a specific flaw in parsing CBZ files. The issue arises from insufficient validation of user-supplied paths prior to file operations. Attackers can exploit this vulnerability to execute code in the context of the current user. - **Mitigation**: Due to the nature of the vulnerability, the only effective mitigation strategy is to limit interaction with the product. #### Detailed Information - **Report Date**: 2025-08-12 - ZDI reported the vulnerability to the vendor - **Update Dates**: - 2025-09-24 - ZDI requested update - 2025-11-10 - ZDI requested update - 2025-12-05 - ZDI notified the vendor that the case would be released as a 0-day advisory on December 11, 2025 #### Disclosure Timeline - **Report Date**: 2025-08-12 - Vulnerability reported to vendor - **Public Release**: 2025-12-11 - Coordinated public release of advisory - **Update**: 2025-12-11 - Advisory updated #### Acknowledgments - kimiya