FreeRDP is a free implementation of the Remote Desktop Protocol. Versions on the 2.x branch prior to to 2.11.8 and on the 3.x branch prior to 3.23.0 have an out-of-bounds read vulnerability in the FreeRDP client's RDPGFX channel that allows a malicious RDP server to read uninitialized heap memory by sending a crafted WIRETOSURFACE_2 PDU with a bitmapDataLength value larger than the actual data in the packet. This can lead to information disclosure or client crashes when a user connects to a malicious server. Versions 2.11.8 and 3.23.0 fix the issue.
{
"cna_assigner": "GitHub_M",
"cwe_ids": [
"CWE-125",
"CWE-20"
],
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/25xxx/CVE-2026-25941.json"
}"2026-04-11T03:29:11Z"
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-25941.json"
[
{
"target": {
"function": "rdpgfx_recv_wire_to_surface_2_pdu",
"file": "channels/rdpgfx/client/rdpgfx_main.c"
},
"signature_version": "v1",
"deprecated": false,
"digest": {
"length": 1720.0,
"function_hash": "87785624444684630625403399873965558033"
},
"id": "CVE-2026-25941-09968854",
"source": "https://github.com/freerdp/freerdp/commit/2e3b77e28ac6a398897d28ba464dcc5dfab9c9e2",
"signature_type": "Function"
},
{
"target": {
"file": "channels/rdpgfx/client/rdpgfx_main.c"
},
"signature_version": "v1",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"198606674677032849176492837790532723166",
"278568999666518782215971555724612607818",
"27072193264022785266947455296503428501",
"274262194524544336846558719596308508606"
]
},
"id": "CVE-2026-25941-ff610600",
"source": "https://github.com/freerdp/freerdp/commit/2e3b77e28ac6a398897d28ba464dcc5dfab9c9e2",
"signature_type": "Line"
}
]