
We found results for “”
CVE-2025-11058
Good to know:



Date: September 29, 2025
Impact When generating PDF files, this vulnerability allows an attacker to read arbitrary files from the filesystem by injecting malicious link element into the XML. Workarounds Test untrusted input with "link" elements with "rel="attachment"" before processing. Credits This vulnerability was reported by Mohamed Ouad from "Doyensec" (https://doyensec.com/).
Severity Score
Related Resources (5)
Severity Score
Weakness Type (CWE)
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-22Top Fix

Upgrade Version
Upgrade to version xml2rfc - 3.30.1;https://github.com/ietf-tools/xml2rfc.git - v3.30.1
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | NONE |
Availability (A): | NONE |