{"id":"CVE-2025-5204","details":"A vulnerability classified as problematic has been found in Open Asset Import Library Assimp 5.4.3. This affects the function MDLImporter::ParseSkinLump_3DGS_MDL7 of the file assimp/code/AssetLib/MDL/MDLMaterialLoader.cpp. The manipulation leads to out-of-bounds read. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future.","modified":"2026-04-12T17:57:44.872315Z","published":"2025-05-26T21:15:19.317Z","references":[{"type":"ADVISORY","url":"https://vuldb.com/?id.310293"},{"type":"ADVISORY","url":"https://vuldb.com/?submit.578013"},{"type":"REPORT","url":"https://github.com/assimp/assimp/issues/6128"},{"type":"REPORT","url":"https://github.com/assimp/assimp/issues/6176"},{"type":"REPORT","url":"https://vuldb.com/?ctiid.310293"},{"type":"EVIDENCE","url":"https://github.com/user-attachments/files/20209911/ParseSkinLump-reproducer.zip"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/assimp/assimp","events":[{"introduced":"0"},{"fixed":"c35200e38ea8f058812b83de2ef32c6093b0ece2"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"5.4.3"}]}}],"versions":["5.2.0","Release3.1_RC1","v.5.0.0.rc1","v.5.0.0.rc2","v3.1-rc2","v3.1.1","v3.2","v3.3","v3.3.1","v4.0.0","v4.0.0.rc1","v4.1.0","v5.0.0","v5.1.0","v5.1.0.rc1","v5.1.1","v5.1.2","v5.1.3","v5.1.4","v5.1.5","v5.1.6","v5.2.0","v5.2.1","v5.2.2","v5.2.3","v5.2.4","v5.2.5","v5.3.0","v5.3.1","v5.4.0","v5.4.1","v5.4.2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-5204.json","vanir_signatures":[{"source":"https://github.com/assimp/assimp/commit/c35200e38ea8f058812b83de2ef32c6093b0ece2","deprecated":false,"target":{"file":"test/unit/utVersion.cpp"},"digest":{"threshold":0.9,"line_hashes":["14751536908339836394842576333578963310","250465586554798767444559000961914664081","237443928289347941562880826078082366790","259836610294362557380643058981394434250"]},"id":"CVE-2025-5204-20a4c35d","signature_type":"Line","signature_version":"v1"},{"source":"https://github.com/assimp/assimp/commit/c35200e38ea8f058812b83de2ef32c6093b0ece2","deprecated":false,"target":{"function":"TEST_F","file":"test/unit/utVersion.cpp"},"digest":{"length":63,"function_hash":"122993617034958603430649906656648264306"},"id":"CVE-2025-5204-cea7f02c","signature_type":"Function","signature_version":"v1"}],"vanir_signatures_modified":"2026-04-12T17:57:44Z"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}