CVE-2025-63365

SoftSea · SoftSea EPUB File Reader

A high-severity vulnerability has been identified in the SoftSea EPUB File Reader, which could allow an attacker to execute arbitrary code on an affected system.

Executive summary

A high-severity vulnerability has been identified in the SoftSea EPUB File Reader, which could allow an attacker to execute arbitrary code on an affected system. Successful exploitation requires an attacker to convince a user to open a specially crafted EPUB file, potentially leading to a full system compromise, data theft, or malware installation.

Vulnerability

This vulnerability is a stack-based buffer overflow within the EPUB file parsing component of the SoftSea EPUB File Reader. An attacker can craft a malicious EPUB file with specific metadata that, when opened by a user, causes the application to write data beyond the boundaries of a fixed-length buffer on the stack. This overwrite can corrupt adjacent memory, including the function's return address, allowing the attacker to hijack the program's execution flow and run arbitrary code with the privileges of the logged-in user.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.1. If exploited, an attacker could gain control over an employee's workstation, establishing a foothold within the corporate network. Potential consequences include the theft of sensitive corporate or personal data, installation of persistent malware like ransomware or spyware, and disruption of business operations. A successful attack could lead to significant financial loss, regulatory penalties, and reputational damage.

Remediation

Immediate Action: The primary remediation is to apply the vendor-supplied security updates to all affected instances of the SoftSea EPUB File Reader immediately. Organizations should first identify all systems where the vulnerable software is installed and then deploy the patch through centralized software management systems.

Proactive Monitoring: Security teams should monitor for indicators of compromise related to this vulnerability. This includes observing endpoint logs for suspicious child processes spawning from the EPUBReader.exe process, monitoring for unusual outbound network connections from workstations running the software, and creating detection rules in EDR/SIEM solutions to alert on the download or opening of EPUB files from untrusted sources.

Compensating Controls: If immediate patching is not feasible, organizations can implement compensating controls to reduce risk. These include using application whitelisting to prevent the EPUB reader from executing, restricting users from downloading or opening EPUB files from the internet, and providing user awareness training on the dangers of opening unsolicited email attachments.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high severity rating and the potential for arbitrary code execution, this vulnerability poses a significant risk. Although there is no evidence of active exploitation at this time, threat actors are known to rapidly develop exploits for such vulnerabilities. We strongly recommend that organizations prioritize the identification and patching of all vulnerable systems to mitigate the risk of a future compromise.