CVE-2025-15274

FontForge · FontForge Multiple Products

A critical vulnerability has been discovered in FontForge software, identified as CVE-2025-15274.

Executive summary

A critical vulnerability has been discovered in FontForge software, identified as CVE-2025-15274. This flaw allows an attacker to take full control of a user's computer by tricking them into opening a specially crafted font file. Successful exploitation could lead to data theft, malware installation, or further compromise of the organization's network.

Vulnerability

This is a heap-based buffer overflow vulnerability that occurs during the parsing of Spline Font Database (.sfd) files. An attacker can create a malicious .sfd file with specific data that, when opened by a vulnerable version of FontForge, causes the application to write data beyond the intended memory buffer. This memory corruption can be leveraged by the attacker to overwrite critical program instructions and execute arbitrary code on the victim's system with the same privileges as the user running the application.

Business impact

This is a High severity vulnerability with a CVSS score of 8.8. Successful exploitation grants an attacker Remote Code Execution (RCE) capabilities on the affected system. The potential consequences include the installation of malware such as ransomware or spyware, theft of sensitive intellectual property or personal data, and unauthorized access to the corporate network. If an attacker gains a foothold, they can use the compromised machine to move laterally and attack other internal systems, leading to a wider data breach, significant financial loss, and reputational damage.

Remediation

Immediate Action: Apply security patches provided by FontForge immediately to all systems where the software is installed, prioritizing any internet-facing or automated systems that may process .sfd files. After patching, monitor systems for any signs of exploitation attempts by reviewing application and system logs for unexpected crashes or behavior related to FontForge processes.

Proactive Monitoring: Implement enhanced monitoring to detect potential exploitation. Look for FontForge application crashes in system event logs, monitor for unusual child processes spawned by FontForge, and inspect network traffic for unexpected outbound connections from workstations running the software. Endpoint Detection and Response (EDR) solutions should be configured to alert on suspicious file creation or process execution originating from FontForge.

Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce risk. Restrict the opening of .sfd files from untrusted sources, such as email attachments or web downloads. Use application control software to prevent FontForge from executing unknown child processes. Consider running FontForge in a sandboxed or virtualized environment to contain the impact of a potential compromise.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high severity (CVSS 8.8) and the risk of remote code execution, this vulnerability poses a significant threat to the organization. We strongly recommend that all vulnerable instances of FontForge are patched immediately, following the principle of "patch, then monitor." While this CVE is not yet on the CISA KEV list, its critical nature demands that it be treated with the highest priority. Organizations should assume that threat actors will actively work to develop exploits for this vulnerability and must act preemptively to mitigate the risk.