The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-6654

CVE-2025-6654: PDF-XChange Editor PRC File RCE Flaw

CVE-2025-6654 is a remote code execution vulnerability in PDF-XChange Editor's PRC file parser that allows attackers to execute arbitrary code through malicious files. This article covers technical details, impact, and mitigations.

Updated: January 22, 2026

CVE-2025-6654 Overview

CVE-2025-6654 is an out-of-bounds write vulnerability in PDF-XChange Editor that allows remote attackers to execute arbitrary code on affected installations. This vulnerability exists within the parsing of PRC (Product Representation Compact) files, a 3D data format commonly embedded in PDF documents. User interaction is required to exploit this vulnerability—the target must either visit a malicious webpage or open a maliciously crafted file.

The specific flaw stems from the lack of proper validation of user-supplied data during PRC file parsing, which can result in a write operation past the end of an allocated buffer. An attacker who successfully exploits this vulnerability can execute arbitrary code in the context of the current process, potentially leading to complete system compromise.

Critical Impact

Successful exploitation allows arbitrary code execution in the context of the current user. If the user has administrative privileges, an attacker could take full control of the affected system, install malware, exfiltrate sensitive data, or use it as a pivot point for lateral movement within a network.

Affected Products

  • PDF-XChange Editor version 10.5.2.395
  • PDF-XChange PDF-Tools version 10.5.2.395
  • Earlier versions may also be affected

Discovery Timeline

  • 2025-06-25 - CVE-2025-6654 published to NVD
  • 2025-07-01 - Last updated in NVD database

Technical Details for CVE-2025-6654

Vulnerability Analysis

This vulnerability is classified as CWE-787 (Out-of-Bounds Write), a memory corruption flaw that occurs when a program writes data past the boundaries of an allocated memory buffer. In the context of PDF-XChange Editor, the vulnerability manifests during the parsing of PRC files, which are 3D CAD data containers that can be embedded within PDF documents.

The root cause lies in insufficient bounds checking when processing user-controlled data within PRC file structures. When the parser encounters a malformed PRC file with specially crafted size or length fields, it fails to validate that the data being written fits within the allocated buffer space. This oversight allows an attacker to corrupt adjacent memory regions.

The exploitation requires local attack vector with user interaction—meaning the victim must be tricked into opening a malicious document or visiting a compromised webpage. Despite this requirement, the potential impact is severe as successful exploitation results in arbitrary code execution with the privileges of the current user.

Root Cause

The vulnerability originates from improper input validation within the PRC file parsing routines of PDF-XChange Editor. When processing PRC file structures, the application allocates memory buffers based on size values specified within the file format. However, the parser fails to adequately verify that subsequent data operations stay within the bounds of these allocated buffers.

Specifically, when the parser reads and processes element data from the PRC stream, it trusts user-controlled length fields without sufficient validation. This allows a malformed file to specify data lengths that exceed buffer boundaries, causing the application to write past the end of allocated memory.

Attack Vector

An attacker can exploit this vulnerability through multiple vectors:

  1. Malicious Document Delivery: Crafting a PDF document containing an embedded malicious PRC file and distributing it via email, file sharing, or download links
  2. Drive-by Download: Hosting a malicious PRC file or PDF on a compromised or attacker-controlled website
  3. Watering Hole Attacks: Targeting specific organizations by compromising websites frequently visited by their employees

The attack requires social engineering to convince the target to open the malicious file. Once opened in a vulnerable version of PDF-XChange Editor, the malformed PRC data triggers the out-of-bounds write condition. The attacker can carefully craft the overflow data to overwrite critical memory structures such as function pointers or return addresses, ultimately redirecting execution to attacker-controlled shellcode.

The vulnerability was tracked by the Zero Day Initiative as ZDI-CAN-26729 and published as ZDI-25-439.

Detection Methods for CVE-2025-6654

Indicators of Compromise

  • Unexpected crashes or abnormal termination of PDF-XChange Editor processes
  • PDF documents containing embedded PRC files from untrusted sources
  • Suspicious child processes spawned from PDF-XChange Editor (e.g., cmd.exe, powershell.exe)
  • Memory access violations or exception handling errors in application logs

Detection Strategies

  • Monitor for PDF-XChange Editor process creating unexpected child processes, particularly command shells or scripting engines
  • Implement file inspection at email gateways and web proxies to detect PDF files containing PRC streams with anomalous size values
  • Deploy endpoint detection rules to identify memory corruption exploitation attempts in document processing applications
  • Analyze crash dumps from PDF-XChange Editor for signs of heap corruption or controlled memory overwrites

Monitoring Recommendations

  • Enable detailed application logging and crash reporting for PDF-XChange Editor installations
  • Implement network monitoring for unusual outbound connections following document opening events
  • Configure endpoint telemetry to capture process creation chains originating from document applications
  • Review security event logs for DEP (Data Execution Prevention) or ASLR violations in PDF-XChange processes

How to Mitigate CVE-2025-6654

Immediate Actions Required

  • Update PDF-XChange Editor and PDF-Tools to the latest patched version available from the vendor
  • Implement user awareness training to warn against opening PDF documents from untrusted or unexpected sources
  • Consider temporarily restricting the processing of PDF files containing 3D/PRC content in high-risk environments
  • Deploy application whitelisting or sandboxing to limit the impact of successful exploitation

Patch Information

PDF-XChange has released security updates addressing this vulnerability. Organizations should consult the PDF-XChange Security Bulletins for the latest patch information and update instructions. Ensure all instances of PDF-XChange Editor version 10.5.2.395 and PDF-Tools version 10.5.2.395 are updated to the remediated versions.

For detailed technical information about this vulnerability, refer to the Zero Day Initiative Advisory ZDI-25-439.

Workarounds

  • Configure PDF-XChange Editor to disable 3D/PRC content rendering if the feature is not business-critical
  • Use Protected View or sandbox mode when opening documents from untrusted sources
  • Implement email attachment filtering to quarantine or strip PDF documents containing PRC streams
  • Consider using alternative PDF readers in high-security environments until patches can be applied
bash
# Configuration example - Restrict execution from temporary directories commonly used during exploitation
# Windows AppLocker policy to block execution from common exploitation paths
# Apply via Group Policy or local security policy

# PowerShell command to check installed PDF-XChange version
Get-ItemProperty "HKLM:\SOFTWARE\Tracker Software\PDF-XChange Editor" -Name "Version" -ErrorAction SilentlyContinue

# Verify all PDF-XChange installations are updated
Get-WmiObject -Class Win32_Product | Where-Object { $_.Name -like "*PDF-XChange*" } | Select-Object Name, Version

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechPdf Xchange

  • SeverityHIGH

  • CVSS Score7.8

  • EPSS Probability0.07%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityHigh
  • AvailabilityHigh
  • CWE References
  • CWE-787
  • Technical References
  • Zero Day Initiative Advisory ZDI-25-439
  • Vendor Resources
  • PDF-XChange Security Bulletins
  • Related CVEs
  • CVE-2025-0910: PDF-XChange Editor U3D Parsing RCE Flaw

  • CVE-2025-0904: PDF-XChange Editor Information Disclosure

  • CVE-2025-0911: PDF-XChange Editor Info Disclosure Bug

  • CVE-2025-0905: PDF-XChange Editor Information Disclosure
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English