Vulnerability Description
A flaw was found in xfig. This vulnerability allows possible code execution via local input manipulation via bezier_spline function.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fig2Dev Project | Fig2Dev | 3.2.9a |
| Redhat | Enterprise Linux | 6.0 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2026:0700
- https://access.redhat.com/errata/RHSA-2026:0704
- https://access.redhat.com/errata/RHSA-2026:0705
- https://access.redhat.com/errata/RHSA-2026:0756
- https://access.redhat.com/security/cve/CVE-2025-46397Vendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2362058Vendor Advisory
- https://sourceforge.net/p/mcj/tickets/192/ExploitIssue Tracking
- https://lists.debian.org/debian-lts-announce/2025/04/msg00043.html
FAQ
What is CVE-2025-46397?
CVE-2025-46397 is a vulnerability with a CVSS score of 7.8 (HIGH). A flaw was found in xfig. This vulnerability allows possible code execution via local input manipulation via bezier_spline function.
How severe is CVE-2025-46397?
CVE-2025-46397 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-46397?
Check the references section above for vendor advisories and patch information. Affected products include: Fig2Dev Project Fig2Dev, Redhat Enterprise Linux.