{
  "affected": [
    {
      "database_specific": {
        "unresolved_ranges": [
          {
            "events": [
              {
                "introduced": "0"
              },
              {
                "last_affected": "1.1.3.4663"
              }
            ]
          }
        ]
      }
    }
  ],
  "details": "PDFPatcher thru 1.1.3.4663 executable's XML bookmark import functionality does not restrict XML external entity (XXE) references. The application uses .NET's XmlDocument class without disabling external entity resolution, enabling attackers to: Read arbitrary files from the victim's filesystem, exfiltrate sensitive data via out-of-band (OOB) HTTP requests, perform SSRF attacks against internal network resources, or cause a denial of service via entity expansion attacks.",
  "id": "CVE-2025-63917",
  "modified": "2026-03-10T21:50:19.107412531Z",
  "published": "2025-11-17T17:15:51.207Z",
  "references": [
    {
      "type": "PACKAGE",
      "url": "https://github.com/wmjordan/PDFPatcher"
    },
    {
      "type": "ARTICLE",
      "url": "https://www.cnblogs.com/pdfpatcher"
    },
    {
      "type": "EVIDENCE",
      "url": "https://github.com/cydtseng/Vulnerability-Research/blob/main/pdfpatcher/XXE-Importers.md"
    }
  ],
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L",
      "type": "CVSS_V3"
    }
  ]
}