CVE-2025-0910 Overview
CVE-2025-0910 is an out-of-bounds write vulnerability in PDF-XChange Editor that allows remote attackers to execute arbitrary code on affected installations. The flaw resides in the parsing logic for Universal 3D (U3D) files embedded within PDF documents. Exploitation requires user interaction: the target must open a malicious file or visit a malicious page that delivers crafted content. The issue stems from insufficient validation of user-supplied data, enabling a write past the end of an allocated buffer. An attacker who successfully exploits this flaw runs code in the context of the current PDF-XChange Editor process. The vulnerability was reported through the Zero Day Initiative as ZDI-CAN-25748 and tracked as advisory ZDI-25-065.
Critical Impact
Successful exploitation grants arbitrary code execution in the context of the user running PDF-XChange Editor, enabling document-based malware delivery and lateral movement on workstations.
Affected Products
- PDF-XChange Editor (see vendor advisory for affected build ranges)
- PDF-XChange Editor Plus
- Any product bundling the vulnerable U3D parsing component
Discovery Timeline
- 2025-02-11 - CVE-2025-0910 published to the National Vulnerability Database
- 2025-02-12 - Last updated in the NVD database
- Reported through the Zero Day Initiative as ZDI-CAN-25748 and published as advisory ZDI-25-065
Technical Details for CVE-2025-0910
Vulnerability Analysis
The vulnerability is classified as an out-of-bounds write [CWE-787] in the U3D file parser used by PDF-XChange Editor. U3D is a compressed 3D model format that can be embedded inside PDF documents to render interactive 3D content. When the parser processes a malformed U3D stream, it fails to correctly validate size or offset fields supplied in the file, and subsequent write operations exceed the bounds of an allocated heap object. Memory corruption adjacent to the target buffer can overwrite object metadata, function pointers, or vtables, which an attacker can chain into control-flow hijacking and arbitrary code execution. Because PDF-XChange Editor renders embedded 3D content during normal document viewing, opening a single crafted PDF is sufficient to trigger the bug.
Root Cause
The root cause is the lack of proper validation of attacker-controlled length and offset values inside U3D block structures before they are used in memory write operations. The parser trusts header-supplied sizes and copies or writes data without enforcing destination buffer boundaries, producing the heap out-of-bounds write condition described in the Zero Day Initiative advisory.
Attack Vector
The attack vector is network-adjacent but requires user interaction. An attacker delivers a crafted PDF or U3D file through email, a download link, a web page, or a file-sharing service. When the victim opens the file in PDF-XChange Editor, the embedded U3D content is parsed and the corruption is triggered. No elevated privileges are needed for the initial compromise, and code executes with the privileges of the logged-on user. See the Zero Day Initiative Advisory ZDI-25-065 for additional technical context.
Detection Methods for CVE-2025-0910
Indicators of Compromise
- PDF documents containing U3D streams (/Subtype /U3D or 3D annotation entries) sourced from untrusted senders or domains
- Unexpected child processes spawned by PDFXEdit.exe, including shells, scripting hosts, or LOLBins such as powershell.exe, cmd.exe, wscript.exe, or mshta.exe
- Crash reports or Windows Error Reporting events naming PDFXEdit.exe with heap corruption faults shortly after opening a PDF
- Outbound network connections initiated by PDFXEdit.exe to previously unseen domains or IP addresses
Detection Strategies
- Inspect inbound PDFs at the email gateway and web proxy for embedded U3D objects and flag samples from low-reputation sources
- Apply EDR behavioral rules that alert on process creation, code injection, or memory allocation anomalies originating from PDF-XChange Editor
- Correlate file-open events with subsequent suspicious child processes or DLL loads to identify exploitation chains
Monitoring Recommendations
- Forward PDF-XChange Editor process telemetry, file-open events, and crash data to a centralized SIEM or data lake for retrospective hunting
- Monitor endpoint inventories to confirm PDF-XChange Editor is updated to a patched build across all managed systems
- Track user-initiated downloads of PDF files from external sources and flag those containing 3D annotation streams
How to Mitigate CVE-2025-0910
Immediate Actions Required
- Update PDF-XChange Editor to the latest version released by Tracker Software / PDF-XChange that addresses CVE-2025-0910
- Restrict opening of PDFs from untrusted sources and reinforce phishing awareness training for end users
- Where business processes allow, disable rendering of embedded 3D (U3D) content within PDF viewers
Patch Information
Refer to the Zero Day Initiative Advisory ZDI-25-065 and the PDF-XChange product release notes for the specific fixed build. Apply the vendor-supplied update across all endpoints running PDF-XChange Editor or PDF-XChange Editor Plus. No public proof-of-concept exploit is currently listed, but the documented impact justifies prompt patching.
Workarounds
- Configure an alternate default PDF reader for users who do not require 3D rendering until the patch is deployed
- Use application allowlisting to block execution of unpatched PDFXEdit.exe builds
- Apply attack surface reduction rules that prevent Office and PDF readers from spawning child processes such as scripting engines
# Example: block PDFXEdit.exe from spawning common LOLBin child processes via Windows Defender ASR
Add-MpPreference -AttackSurfaceReductionRules_Ids D4F940AB-401B-4EFC-AADC-AD5F3C50688A -AttackSurfaceReductionRules_Actions Enabled
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


