SB2026011976 - Multiple vulnerabilities in Soda PDF Desktop



SB2026011976 - Multiple vulnerabilities in Soda PDF Desktop

Published: January 19, 2026

Security Bulletin ID SB2026011976
Severity
High
Patch available
NO
Number of vulnerabilities 10
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 50% Medium 40% Low 10%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 10 secuirty vulnerabilities.


1) Unquoted Search Path or Element (CVE-ID: CVE-2025-14406)

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to unquoted search path or element within the configuration of OpenSSL. A local user can execute arbitrary code on the target system with elevated privileges.


2) Insufficient UI Warning of Dangerous Operations (CVE-ID: CVE-2025-14415)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to the execution of dangerous script without user warning within the implementation of the Launch action. A remote attacker can trick a victim to open a specially crafted file and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


3) Insufficient UI Warning of Dangerous Operations (CVE-ID: CVE-2025-14414)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to the execution of dangerous script without user warning. A remote attacker can trick a victim to open a specially crafted Word file and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


4) Path traversal (CVE-ID: CVE-2025-14413)

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences. A remote attacker can trick a victim to open a specially crafted CBZ file and upload arbitrary files on the system, leading to arbitrary code execution.


5) Insufficient UI Warning of Dangerous Operations (CVE-ID: CVE-2025-14412)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to the execution of dangerous script without user warning. A remote attacker can trick a victim to open a specially crafted XLS file and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


6) Out-of-bounds read (CVE-ID: CVE-2025-14411)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system.


7) Out-of-bounds read (CVE-ID: CVE-2025-14410)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system.


8) Out-of-bounds write (CVE-ID: CVE-2025-14409)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input. A remote attacker can create a specially crafted PDF file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.


9) Out-of-bounds read (CVE-ID: CVE-2025-14408)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system.


10) Buffer overflow (CVE-ID: CVE-2025-14407)

The vulnerability allows a remote attacker to gain access to sensitive information on the target system.

The vulnerability exists due to a boundary error. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and gain access to sensitive information on the system.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.