CVE-2025-54988

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-54988
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-54988.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-54988
Aliases
Downstream
Related
Published
2025-08-20T20:15:33Z
Modified
2025-09-04T13:52:39.485629Z
Summary
[none]
Details

Critical XXE in Apache Tika (tika-parser-pdf-module) in Apache Tika 1.13 through and including 3.2.1 on all platforms allows an attacker to carry out XML External Entity injection via a crafted XFA file inside of a PDF. An attacker may be able to read sensitive data or trigger malicious requests to internal resources or third-party servers. Note that the tika-parser-pdf-module is used as a dependency in several Tika packages including at least: tika-parsers-standard-modules, tika-parsers-standard-package, tika-app, tika-grpc and tika-server-standard.

Users are recommended to upgrade to version 3.2.2, which fixes this issue.

References

Affected packages

Debian:11 / tika

Package

Name
tika
Purl
pkg:deb/debian/tika?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.22-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/apache/tika

Affected ranges

Type
GIT
Repo
https://github.com/apache/tika
Events

Affected versions

1.*

1.13
1.13-rc1
1.14
1.14-rc1
1.15
1.15-rc1
1.16
1.17

2.*

2.0.0
2.0.0-ALPHA
2.0.0-BETA
2.1.0
2.2.0
2.2.1
2.3.0
2.4.0
2.4.1
2.5.0
2.6.0
2.7.0
2.8.0
2.9.0

3.*

3.0.0
3.0.0-BETA
3.0.0-BETA2
3.1.0
3.2.0-rc1
3.2.0-rc2
3.2.1

tika-3.*

tika-3.1.0-rc1