{"id":"CVE-2025-63918","details":"PDFPatcher executable does not validate user-supplied file paths, allowing directory traversal attacks allowing attackers to upload arbitrary files to arbitrary locations.","modified":"2026-03-13T03:38:18.146929Z","published":"2025-11-17T17:15:51.333Z","references":[{"type":"PACKAGE","url":"https://github.com/wmjordan/PDFPatcher"},{"type":"ARTICLE","url":"https://www.cnblogs.com/pdfpatcher"},{"type":"EVIDENCE","url":"https://github.com/cydtseng/Vulnerability-Research/blob/main/pdfpatcher/DirectoryTraversal-ImageExport.md"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"1.1.3.4663"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-63918.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}