CVE-2025-15569
Publication date 10 February 2026
Last updated 11 February 2026
Ubuntu priority
Cvss 3 Severity Score
Description
A flaw has been found in Artifex MuPDF up to 1.26.1 on Windows. The impacted element is the function get_system_dpi of the file platform/x11/win_main.c. This manipulation causes uncontrolled search path. The attack requires local access. The attack is considered to have high complexity. The exploitability is regarded as difficult. Upgrading to version 1.26.2 is sufficient to resolve this issue. Patch name: ebb125334eb007d64e579204af3c264aadf2e244. Upgrading the affected component is recommended.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| mupdf | 25.10 questing | Ignored affects only Windows |
| 24.04 LTS noble | Ignored affects only Windows | |
| 22.04 LTS jammy | Ignored affects only Windows | |
| 20.04 LTS focal | Ignored affects only Windows | |
| 18.04 LTS bionic | Ignored affects only Windows | |
| 16.04 LTS xenial | Ignored affects only Windows |
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Local |
| Attack complexity | High |
| Privileges required | Low |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity impact | High |
| Availability impact | High |
| Vector | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
References
Other references
- https://www.cve.org/CVERecord?id=CVE-2025-15569
- https://artifex.com/
- https://casper.mupdf.com/downloads/archive/mupdf-1.26.2-windows.zip
- https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=ebb125334eb007d64e579204af3c264aadf2e244
- https://vuldb.com/?ctiid.344924
- https://vuldb.com/?id.344924
- https://vuldb.com/?submit.750978