CVE-2019-25467:
Verypdf docPrint Pro 8.0 contains a local buffer overflow vulnerability allowing arbitrary code execution via malicious input in password fields.
Score
A numerical rating that indicates how dangerous this vulnerability is.
8.4High- Published Date:Mar 11, 2026
- CISA KEV Date:*No Data*
- Industries Affected:20
Exploitability
- Score:2.5
- Attack Vector:LOCAL
- Attack Complexity:LOW
- Privileges Required:NONE
- User Interaction:NONE
- Scope:UNCHANGED
Impact
- Score:5.9
- Confidentiality Impact:HIGH
- Integrity Impact:HIGH
- Availability Impact:HIGH
Description Preview
Verypdf docPrint Pro 8.0 contains a local buffer overflow vulnerability allowing arbitrary code execution via malicious input in password fields.
Overview
The vulnerability in Verypdf docPrint Pro 8.0 is a critical local security flaw that could lead to complete system compromise. It has been assigned a CVSS v3.1 base score of 8.4 (High severity) and a CVSS v4.0 base score of 8.6 (High severity). The attack vector is local, requiring no privileges or user interaction, but has a high impact on confidentiality, integrity, and availability. The weakness is categorized as CWE-787, which typically refers to out-of-bounds write vulnerabilities. This type of vulnerability can often be exploited to achieve arbitrary code execution, potentially giving an attacker full control over the affected system.
Remediation
- As of the vulnerability disclosure, no specific patch or update has been mentioned. However, users and administrators of systems running Verypdf docPrint Pro 8.0 should take the following steps:
- 1. Update to the latest version of the software if available.
- 2. If an update is not available, consider temporarily discontinuing use of the software until a patch is released.
- 3. Implement strict access controls to limit local access to systems running the vulnerable software.
- 4. Monitor for any suspicious activity or unexpected behavior in systems using Verypdf docPrint Pro.
- 5. Keep an eye on the vendor's website and security bulletins for any updates or patches addressing this vulnerability.
- 6. Consider implementing additional security measures such as application whitelisting and endpoint detection and response (EDR) solutions to mitigate potential exploitation attempts.
References
- [1] VeryPDF. "docPrint Pro Setup." http://dl.verypdf.net/docprint_pro_setup.exe
- [2] VeryPDF. "Official Website." http://www.verypdf.com
- [3] Exploit Database. "Verypdf docPrint Pro 8.0 - 'User Password' Local SEH Overflow." https://www.exploit-db.com/exploits/47394
- [4] VulnCheck. "Verypdf docPrint Pro Local SEH Buffer Overflow Advisory." https://www.vulncheck.com/advisories/verypdf-docprint-pro-local-seh-buffer-overflow
Industries Affected
Below is a list of industries most commonly impacted or potentially at risk based on intelligence.