CVE-2025-54988
Apache · Apache Tika (specifically the tika-parser-pdf-module)
A critical vulnerability has been discovered in Apache Tika, a widely used software library for processing and extracting data from various file types.
Executive summary
A critical vulnerability has been discovered in Apache Tika, a widely used software library for processing and extracting data from various file types. This flaw allows a remote attacker to steal sensitive information from the server or attack other systems within the internal network by simply submitting a specially crafted PDF file. Due to the high severity and the library's widespread use, this vulnerability poses a significant risk of data breaches and further network compromise.
Vulnerability
The vulnerability is a critical XML External Entity (XXE) injection flaw within Apache Tika's PDF parsing module. The issue arises when the application processes a PDF file containing a specially crafted XML Forms Architecture (XFA) form. The XML parser used by Tika fails to properly disable or sanitize external entity references within the XFA data. An attacker can exploit this by embedding malicious XML entities in a PDF file. When the vulnerable Tika library parses this file, it will resolve these entities, which can lead to the disclosure of local files from the server, Server-Side Request Forgery (SSRF) attacks against internal network resources, or a denial-of-service condition.
Business impact
This vulnerability is rated as critical with a CVSS score of 9.8. Successful exploitation could have severe consequences for the organization, including the exfiltration of highly sensitive data such as configuration files, source code, and private credentials directly from the affected server. Furthermore, the ability to perform SSRF attacks allows an adversary to use the compromised server as a pivot point to map and attack other internal systems, bypassing perimeter security controls. The potential for a significant data breach, operational disruption from a denial-of-service attack, and subsequent reputational damage makes this a high-priority threat.
Remediation
Immediate Action: Immediately identify all applications and systems using the affected versions of Apache Tika and update them to the latest patched version as recommended by the Apache Software Foundation. After patching, monitor application logs for any errors or unusual activity related to file processing. Review historical access logs for any signs of compromise or suspicious file uploads prior to the patch deployment.
Proactive Monitoring: Implement enhanced monitoring on affected systems. Look for unusual outbound network connections (e.g., HTTP, FTP, DNS) originating from servers that run Apache Tika, as this could indicate SSRF or data exfiltration attempts. Monitor application and system logs for errors related to XML parsing, file access denials, or unexpected connections.
Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce risk:
- Egress Filtering: Apply strict firewall rules to limit or block all outbound network traffic from the application server to untrusted internal and external destinations.
- Least Privilege: Ensure the service account running the application has the minimum necessary permissions to perform its function, restricting its ability to read sensitive files on the operating system.
- Web Application Firewall (WAF): While not a complete solution, a WAF may be configured to inspect and block known malicious file upload patterns, providing an additional layer of defense.
Exploitation status
Public Exploit Available: False
Analyst recommendation
This vulnerability represents a critical and immediate threat to the organization. The CVSS score of 9.8 reflects the ease of exploitation and the potential for severe impact, including full server compromise and data exfiltration, without requiring any authentication. We strongly recommend that all system owners immediately prioritize the identification and patching of all vulnerable instances of Apache Tika. Due to its high severity, this vulnerability is a prime candidate for future inclusion in the CISA KEV catalog and should be treated with the highest urgency.