Impact
MuPDF mutool does not sanitize PDF metadata before delivering it to the terminal, allowing attackers to embed arbitrary ANSI escape sequences into PDF metadata. When a user runs mutool info, those sequences are interpreted by the terminal, which can clear the display and render arbitrary text, enabling social‑engineering attacks such as presenting fake prompts or spoofed commands.
Affected Systems
Every installation of Artifex Software Inc.’s MuPDF that includes the mutool utility and has not applied the sanitization patch is vulnerable. The issue applies to all versions of MuPDF lacking the recent commit that filters metadata before output.
Risk and Exploitability
The CVSS score of 4.8 indicates moderate severity. EPSS data is not available and the vulnerability is not listed in CISA’s KEV catalog. Exploitation requires a crafted PDF and the legitimate user to execute mutool info, making the attack local and user‑dependent. Despite the local nature, the potential for social engineering warrants prompt action to mitigate the risk.
OpenCVE Enrichment