{
  "threat_severity" : "Critical",
  "public_date" : "2025-12-04T16:17:24Z",
  "bugzilla" : {
    "description" : "tika-core: tika-parsers: tika-parser-pdf-module: Apache Tika core, Apache Tika parsers, Apache Tika PDF parser module: Update to CVE-2025-54988 to expand scope of artifacts affected",
    "id" : "2418870",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2418870"
  },
  "cvss3" : {
    "cvss3_base_score" : "10.0",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-611",
  "details" : [ "Critical XXE in Apache Tika tika-core (1.13-3.2.1), tika-pdf-module (2.0.0-3.2.1) and tika-parsers (1.13-1.28.5) modules on all platforms allows an attacker to carry out XML External Entity injection via a crafted XFA file inside of a PDF. \nThis CVE covers the same vulnerability as in CVE-2025-54988. However, this CVE expands the scope of affected packages in two ways. \nFirst, while the entrypoint for the vulnerability was the tika-parser-pdf-module as reported in CVE-2025-54988, the vulnerability and its fix were in tika-core. Users who upgraded the tika-parser-pdf-module but did not upgrade tika-core to >= 3.2.2 would still be vulnerable. \nSecond, the original report failed to mention that in the 1.x Tika releases, the PDFParser was in the \"org.apache.tika:tika-parsers\" module.", "A XML External Entity (XXE) injection vulnerability was found in the Apache Tika framework's PDF parsing functionality. It could allow a remote, unauthenticated attacker to exploit the system by providing a specially crafted PDF containing an XFA (XML Forms Architecture) file. This flaw could lead to sensitive information disclosure or, potentially, Remote Code Execution (RCE) on the server. The issue affects multiple Tika modules, including tika-core, tika-pdf-module, and tika-parsers, within the version ranges 1.13 through 3.2.1.\nThis CVE expands on the scope of CVE-2025-54988 to clarify that the root cause and required fix reside in the tika-core module, regardless of which parser module is used." ],
  "statement" : "This vulnerability is rated Critical because it can be triggered when Apache Tika processes a maliciously crafted XFA file embedded within a PDF. Successful exploitation enables XML External Entity (XXE) injection, allowing an attacker to access sensitive local files and initiate arbitrary requests to internal or external network resources. This can lead to Server-Side Request Forgery (SSRF), data tampering, and potential elevation of privileges. With high impact across confidentiality, integrity, and availability, this vulnerability poses a severe risk to affected systems.",
  "affected_release" : [ {
    "product_name" : "Red Hat build of Apache Camel 4.14.2 for Spring Boot 3.5.8",
    "release_date" : "2025-12-11T00:00:00Z",
    "advisory" : "RHSA-2025:23143",
    "cpe" : "cpe:/a:redhat:apache_camel_spring_boot:4.14",
    "package" : "tika-core"
  }, {
    "product_name" : "Red Hat OpenShift Dev Spaces (RHOSDS) 3.25",
    "release_date" : "2025-12-15T00:00:00Z",
    "advisory" : "RHSA-2025:23225",
    "cpe" : "cpe:/a:redhat:openshift_devspaces:3.25::el9",
    "package" : "devspaces/openvsx-rhel9:sha256:31e999abdb05d9dd572f21a91982bc8bfbb2007f1100650715c51d40f6f1f312"
  }, {
    "product_name" : "Red Hat OpenShift Dev Spaces (RHOSDS) 3.25",
    "release_date" : "2025-12-15T00:00:00Z",
    "advisory" : "RHSA-2025:23225",
    "cpe" : "cpe:/a:redhat:openshift_devspaces:3.25::el9",
    "package" : "devspaces/pluginregistry-rhel9:sha256:10821feaf0ba17ef30f0403d29862004615952e289af23794e15d3354bc4f288"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat build of Apache Camel for Spring Boot 4",
    "fix_state" : "Not affected",
    "package_name" : "tika-parser-pdf-module",
    "cpe" : "cpe:/a:redhat:camel_spring_boot:4"
  }, {
    "product_name" : "Red Hat Fuse 7",
    "fix_state" : "Not affected",
    "package_name" : "tika-core",
    "cpe" : "cpe:/a:redhat:jboss_fuse:7"
  }, {
    "product_name" : "Red Hat Fuse 7",
    "fix_state" : "Not affected",
    "package_name" : "tika-parsers",
    "cpe" : "cpe:/a:redhat:jboss_fuse:7"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform 7",
    "fix_state" : "Not affected",
    "package_name" : "tika-core",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_application_platform:7"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform 7",
    "fix_state" : "Not affected",
    "package_name" : "tika-parser-pdf-module",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_application_platform:7"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform 7",
    "fix_state" : "Not affected",
    "package_name" : "tika-parsers",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_application_platform:7"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform 8",
    "fix_state" : "Not affected",
    "package_name" : "tika-core",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_application_platform:8"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform 8",
    "fix_state" : "Not affected",
    "package_name" : "tika-parser-pdf-module",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_application_platform:8"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform 8",
    "fix_state" : "Not affected",
    "package_name" : "tika-parsers",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_application_platform:8"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform Expansion Pack",
    "fix_state" : "Not affected",
    "package_name" : "tika-core",
    "cpe" : "cpe:/a:redhat:jbosseapxp"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform Expansion Pack",
    "fix_state" : "Not affected",
    "package_name" : "tika-parser-pdf-module",
    "cpe" : "cpe:/a:redhat:jbosseapxp"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform Expansion Pack",
    "fix_state" : "Not affected",
    "package_name" : "tika-parsers",
    "cpe" : "cpe:/a:redhat:jbosseapxp"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2025-66516\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-66516\nhttps://cve.org/CVERecord?id=CVE-2025-54988\nhttps://lists.apache.org/thread/s5x3k93nhbkqzztp1olxotoyjpdlps9k" ],
  "name" : "CVE-2025-66516",
  "csaw" : false
}