Poppler 24.06.1 through 25.x before 25.04.0 allows stack consumption and a SIGSEGV via deeply nested structures within the metadata (such as GTSPDFEVersion) of a PDF document, e.g., a regular expression for a long pdfsubver string. This occurs in Dict::lookup, Catalog::getMetadata, and associated functions in PDFDoc, with deep recursion in the regex executor (std::detail::Executor).
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-43718.json"
[
{
"source": "https://gitlab.freedesktop.org/poppler/poppler@f54b815672117c250420787c8c006de98e8c7408",
"signature_type": "Line",
"digest": {
"line_hashes": [
"233156423336985581638429439115477991496",
"152454795627015377293669816595596351114",
"299659320981981766195249654867236296863",
"204554762598959474702255895620365038536",
"328067327222318434627407393269653035557"
],
"threshold": 0.9
},
"deprecated": false,
"target": {
"file": "poppler/PDFDoc.cc"
},
"id": "CVE-2025-43718-3aa31dbf",
"signature_version": "v1"
},
{
"source": "https://gitlab.freedesktop.org/poppler/poppler@f54b815672117c250420787c8c006de98e8c7408",
"signature_type": "Function",
"digest": {
"function_hash": "246324405956984027140250541042169477427",
"length": 757.0
},
"deprecated": false,
"target": {
"file": "poppler/PDFDoc.cc",
"function": "pdfConformanceFromString"
},
"id": "CVE-2025-43718-7f163dd9",
"signature_version": "v1"
}
]