Ce mail provient de l'extérieur, restons vigilants ===================================================================== CERT-Renater Note d'Information No. 2025/VULN532 _____________________________________________________________________ DATE : 21/08/2025 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S): Systems running Apache Tika versions prior to 3.2.1. ===================================================================== https://lists.apache.org/thread/8xn3rqy6kz5b3l1t83kcofkw0w4mmj1w _____________________________________________________________________ CVE-2025-54988: Apache Tika PDF parser module: XXE vulnerability in PDFParser's handling of XFA Severity: critical Affected versions: - Apache Tika PDF parser module (org.apache.tika:tika-parser-pdf-module) 1.13 through 3.2.1 Description: Critical XXE in Apache Tika (tika-parser-pdf-module) in Apache Tika 1.13 through and including 3.2.1 on all platforms allows an attacker to carry out XML External Entity injection via a crafted XFA file inside of a PDF. An attacker may be able to read sensitive data or trigger malicious requests to internal resources or third-party servers. Note that the tika-parser-pdf-module is used as a dependency in several Tika packages including at least: tika-parsers-standard-modules, tika-parsers-standard-package, tika-app, tika-grpc and tika-server-standard. Users are recommended to upgrade to version 3.2.2, which fixes this issue. Credit: Paras Jain and Yakov Shafranovich of Amazon. (reporter) References: https://tika.apache.org/ https://www.cve.org/CVERecord?id=CVE-2025-54988 ========================================================= + CERT-RENATER | tel : 01-53-94-20-44 + + 23/25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email:cert@support.renater.fr + =========================================================