PT-2025-49099 · Apache+2 · Tika-Parsers+6
Tim Allison
·
Published
2025-10-26
·
Updated
2026-02-28
·
CVE-2025-66516
CVSS v4.0
10
10
Critical
| Base vector | Vector | AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H |
Name of the Vulnerable Software and Affected Versions
Apache Tika versions 1.13 through 3.2.1
Apache Tika tika-core versions 1.13 through 3.2.1
Apache Tika tika-pdf-module versions 2.0.0 through 3.2.1
Apache Tika tika-parsers versions 1.13 through 1.28.5
Description
Apache Tika contains a critical XML External Entity (XXE) vulnerability (CVE-2025-66516) with a CVSS score of 10.0. This flaw allows attackers to carry out XXE injection via a crafted XFA file inside a PDF. Exploitation can lead to remote code execution, data exposure, server-side request forgery (SSRF), or denial of service. The vulnerability resides in the
tika-core component, but also affects the tika-parser-pdf-module and tika-parsers modules. The vulnerability occurs when parsing XFA-formatted PDFs, where external entity resolution is not properly restricted. Approximately 12,600 services are estimated to be affected worldwide.Recommendations
Upgrade Apache Tika to version 3.2.2 or later, ensuring that both the
tika-core and tika-parser-pdf-module are updated. If an immediate update is not possible, temporarily disable the processing of XFA-formatted PDFs or implement validation and filtering of incoming documents. Isolate Tika processes using sandboxing, restrict file system access, and prohibit outgoing network requests. Audit logs for suspicious activity related to PDF parsing and XML processing.Exploit
Fix
DoS
RCE
XXE
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
BDU:2025-15736
CVE-2025-66516
DLA-4350-1
GHSA-F58C-GQ56-VJJF
Affected Products
Apache Tika
Bamboo
Confluence
Debian
Tika-Core
Tika-Parsers
Tika-Pdf-Module
References · 125
- 🔥 https://github.com/Ashwesker/Blackash-CVE-2025-66516⭐ 14 🔗 3 · Exploit
- https://bdu.fstec.ru/vul/2025-15736 · Security Note
- https://lists.apache.org/thread/s5x3k93nhbkqzztp1olxotoyjpdlps9k · Vendor Advisory
- https://ubuntu.com/security/CVE-2025-66516 · Vendor Advisory
- https://osv.dev/vulnerability/CVE-2025-66516 · Vendor Advisory
- https://osv.dev/vulnerability/DLA-4350-1 · Vendor Advisory
- https://cve.org/CVERecord?id=CVE-2025-54988 · Security Note
- https://osv.dev/vulnerability/DEBIAN-CVE-2025-66516 · Vendor Advisory
- https://osv.dev/vulnerability/GHSA-f58c-gq56-vjjf · Vendor Advisory
- https://cve.org/CVERecord?id=CVE-2025-66516 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66516 · Security Note
- https://osv.dev/vulnerability/UBUNTU-CVE-2025-66516 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-66516 · Security Note
- https://security-tracker.debian.org/tracker/CVE-2025-66516 · Vendor Advisory
- https://github.com/apache/tika⭐ 3445 🔗 886 · Note