Vulnerability Description
A null pointer dereference occurs in the function break_word_for_overflow_wrap() in MuPDF 1.26.4 when rendering a malformed EPUB document. Specifically, the function calls fz_html_split_flow() to split a FLOW_WORD node, but does not check if node->next is valid before accessing node->next->overflow_wrap, resulting in a crash if the split fails or returns a partial node chain.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Artifex | Mupdf | >= 1.24.0, < 1.26.7 |
Related Weaknesses (CWE)
References
- https://bugs.ghostscript.com/show_bug.cgi?id=708720Issue TrackingThird Party Advisory
- https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=bdd5d24174880Permissions Required
- https://github.com/ISH2YU/CVE-2025-55780/tree/mainThird Party Advisory
FAQ
What is CVE-2025-55780?
CVE-2025-55780 is a vulnerability with a CVSS score of 7.5 (HIGH). A null pointer dereference occurs in the function break_word_for_overflow_wrap() in MuPDF 1.26.4 when rendering a malformed EPUB document. Specifically, the function calls fz_html_split_flow() to spli...
How severe is CVE-2025-55780?
CVE-2025-55780 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-55780?
Check the references section above for vendor advisories and patch information. Affected products include: Artifex Mupdf.