{"api_version":"1","generated_at":"2026-04-17T05:47:22+00:00","cve":"CVE-2025-27363","urls":{"html":"https://cve.report/CVE-2025-27363","api":"https://cve.report/api/cve/CVE-2025-27363.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2025-27363","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2025-27363"},"summary":{"title":"CVE-2025-27363","description":"An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.","state":"PUBLISHED","assigner":"facebook","published_at":"2025-03-11 14:15:25","updated_at":"2026-04-16 19:16:31"},"problem_types":["CWE-787","Out-of-bounds Write (CWE-787)","CWE-787 CWE-787 Out-of-bounds Write"],"metrics":[{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"8.1","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"cve-assign@fb.com","type":"Secondary","score":"8.1","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"CVSS","score":"8.1","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C/CR:H/IR:H/AR:H/MAV:N/MAC:L/MPR:N/MUI:N/MS:U/MC:H/MI:H/MA:H","data":{"baseScore":8.1,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C/CR:H/IR:H/AR:H/MAV:N/MAC:L/MPR:N/MUI:N/MS:U/MC:H/MI:H/MA:H","version":"3.1"}}],"references":[{"url":"http://www.openwall.com/lists/oss-security/2025/03/13/8","name":"http://www.openwall.com/lists/oss-security/2025/03/13/8","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://www.openwall.com/lists/oss-security/2026/04/16/5","name":"http://www.openwall.com/lists/oss-security/2026/04/16/5","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://www.openwall.com/lists/oss-security/2025/03/13/12","name":"http://www.openwall.com/lists/oss-security/2025/03/13/12","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://source.android.com/docs/security/bulletin/2025-05-01","name":"https://source.android.com/docs/security/bulletin/2025-05-01","refsource":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://www.openwall.com/lists/oss-security/2025/03/13/11","name":"http://www.openwall.com/lists/oss-security/2025/03/13/11","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.facebook.com/security/advisories/cve-2025-27363","name":"https://www.facebook.com/security/advisories/cve-2025-27363","refsource":"cve-assign@fb.com","tags":["Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00030.html","name":"https://lists.debian.org/debian-lts-announce/2025/03/msg00030.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://www.openwall.com/lists/oss-security/2025/03/13/1","name":"http://www.openwall.com/lists/oss-security/2025/03/13/1","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://www.openwall.com/lists/oss-security/2025/03/13/2","name":"http://www.openwall.com/lists/oss-security/2025/03/13/2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-27363","name":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-27363","refsource":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://www.openwall.com/lists/oss-security/2025/03/13/3","name":"http://www.openwall.com/lists/oss-security/2025/03/13/3","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://www.openwall.com/lists/oss-security/2025/03/14/4","name":"http://www.openwall.com/lists/oss-security/2025/03/14/4","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://www.openwall.com/lists/oss-security/2025/03/14/3","name":"http://www.openwall.com/lists/oss-security/2025/03/14/3","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://www.openwall.com/lists/oss-security/2025/03/14/2","name":"http://www.openwall.com/lists/oss-security/2025/03/14/2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://www.openwall.com/lists/oss-security/2025/03/14/1","name":"http://www.openwall.com/lists/oss-security/2025/03/14/1","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://www.openwall.com/lists/oss-security/2025/05/06/3","name":"http://www.openwall.com/lists/oss-security/2025/05/06/3","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2025-27363","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-27363","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"FreeType","product":"FreeType","version":"affected 0.0.0 2.13.0 semver","platforms":[]}],"timeline":[{"source":"ADP","time":"2025-05-06T00:00:00.000Z","lang":"en","value":"CVE-2025-27363 added to CISA KEV"}],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2025","cve_id":"27363","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"11.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2025","cve_id":"27363","vulnerable":"1","versionEndIncluding":"2.13.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freetype","cpe5":"freetype","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":{"cve_year":"2025","cve_id":"27363","cve":"CVE-2025-27363","vendorProject":"FreeType","product":"FreeType","vulnerabilityName":"FreeType Out-of-Bounds Write Vulnerability","dateAdded":"2025-05-06","shortDescription":"FreeType contains an out-of-bounds write vulnerability when attempting to parse font subglyph structures related to TrueType GX and variable font files that may allow for arbitrary code execution.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2025-05-27","knownRansomwareCampaignUse":"Unknown","notes":"This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://source.android.com/docs/security/bulletin/2025-05-01 ; https://nvd.nist.gov/vuln/detail/CVE-2025-27363","cwes":"CWE-787","catalogVersion":"2026.04.16","updated_at":"2026-04-16 13:54:08"},"epss":{"cve_year":"2025","cve_id":"27363","cve":"CVE-2025-27363","epss":"0.634390000","percentile":"0.984160000","score_date":"2026-04-16","updated_at":"2026-04-17 00:09:23"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2025-27363","options":[{"Exploitation":"active"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2025-05-07T03:55:53.843762Z","version":"2.0.3"},"type":"ssvc"}},{"other":{"content":{"dateAdded":"2025-05-06","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-27363"},"type":"kev"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-787","description":"CWE-787 Out-of-bounds Write","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-02-26T19:09:42.172Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"references":[{"tags":["vendor-advisory"],"url":"https://source.android.com/docs/security/bulletin/2025-05-01"},{"tags":["government-resource"],"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-27363"}],"timeline":[{"lang":"en","time":"2025-05-06T00:00:00.000Z","value":"CVE-2025-27363 added to CISA KEV"}],"title":"CISA ADP Vulnrichment"},{"providerMetadata":{"dateUpdated":"2026-04-16T18:24:28.329Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"url":"http://www.openwall.com/lists/oss-security/2025/03/13/1"},{"url":"http://www.openwall.com/lists/oss-security/2025/03/13/2"},{"url":"http://www.openwall.com/lists/oss-security/2025/03/13/3"},{"url":"http://www.openwall.com/lists/oss-security/2025/03/13/8"},{"url":"http://www.openwall.com/lists/oss-security/2025/03/13/11"},{"url":"http://www.openwall.com/lists/oss-security/2025/03/13/12"},{"url":"http://www.openwall.com/lists/oss-security/2025/03/14/1"},{"url":"http://www.openwall.com/lists/oss-security/2025/03/14/2"},{"url":"http://www.openwall.com/lists/oss-security/2025/03/14/3"},{"url":"http://www.openwall.com/lists/oss-security/2025/03/14/4"},{"url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00030.html"},{"url":"http://www.openwall.com/lists/oss-security/2025/05/06/3"},{"url":"http://www.openwall.com/lists/oss-security/2026/04/16/5"}],"title":"CVE Program Container"}],"cna":{"affected":[{"defaultStatus":"unaffected","product":"FreeType","vendor":"FreeType","versions":[{"lessThanOrEqual":"2.13.0","status":"affected","version":"0.0.0","versionType":"semver"}]}],"dateAssigned":"2025-02-21T00:00:00.000Z","descriptions":[{"lang":"en","value":"An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild."}],"metrics":[{"cvssV3_1":{"baseScore":8.1,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C/CR:H/IR:H/AR:H/MAV:N/MAC:L/MPR:N/MUI:N/MS:U/MC:H/MI:H/MA:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"description":"Out-of-bounds Write (CWE-787)","lang":"en"}]}],"providerMetadata":{"dateUpdated":"2025-03-13T12:54:55.748Z","orgId":"4fc57720-52fe-4431-a0fb-3d2c8747b827","shortName":"facebook"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://www.facebook.com/security/advisories/cve-2025-27363"}]}},"cveMetadata":{"assignerOrgId":"4fc57720-52fe-4431-a0fb-3d2c8747b827","assignerShortName":"facebook","cveId":"CVE-2025-27363","datePublished":"2025-03-11T13:28:31.705Z","dateReserved":"2025-02-21T19:53:14.160Z","dateUpdated":"2026-04-16T18:24:28.329Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2025-03-11 14:15:25","lastModifiedDate":"2026-04-16 19:16:31","problem_types":["CWE-787","Out-of-bounds Write (CWE-787)","CWE-787 CWE-787 Out-of-bounds Write"],"metrics":{"cvssMetricV31":[{"source":"cve-assign@fb.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","versionEndIncluding":"2.13.0","matchCriteriaId":"47088474-E5B5-4220-8F12-D664F2DED5C1"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*","matchCriteriaId":"FA6FEEC2-9F11-4643-8827-749718254FED"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2025","CveId":"27363","Ordinal":"1","Title":"CVE-2025-27363","CVE":"CVE-2025-27363","Year":"2025"},"notes":[{"CveYear":"2025","CveId":"27363","Ordinal":"1","NoteData":"An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.","Type":"Description","Title":"CVE-2025-27363"}]}}}