{"id":"CVE-2025-46206","details":"An issue in Artifex mupdf 1.25.6, 1.25.5 allows a remote attacker to cause a denial of service via an infinite recursion in the `mutool clean` utility. When processing a crafted PDF file containing cyclic /Next references in the outline structure, the `strip_outline()` function enters infinite recursion","modified":"2026-04-09T10:45:57.892558Z","published":"2025-08-04T18:15:34.810Z","references":[{"type":"WEB","url":"http://artifex.com"},{"type":"WEB","url":"http://mupdf.com"},{"type":"REPORT","url":"https://bugs.ghostscript.com/show_bug.cgi?id=708521"},{"type":"REPORT","url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=0ec7e4d2201bb6df217e01c17396d36297abf9ac"},{"type":"EVIDENCE","url":"https://github.com/Landw-hub/CVE-2025-46206"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/artifexsoftware/mupdf","events":[{"introduced":"0"},{"last_affected":"8610a48f12b71eb7a73b6d68cece78f6342d116f"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.25.6"}]}}],"versions":["0.1","0.2","0.3","0.4","0.5","0.6","0.7","0.8","0.9","1.0","1.0rc1","1.1-forms-tech-preview","1.10","1.10-rc1","1.10-rc2","1.11","1.11-rc1","1.11.1","1.12.0","1.13.0","1.13.0-rc1","1.14.0","1.14.0-rc1","1.15.0","1.15.0-rc1","1.16.0","1.16.0-rc1","1.16.0-rc2","1.16.1","1.16.1-epub-prerelease","1.17.0-rc1","1.18.0","1.18.0-rc1","1.18.1-so-3.12.1-android","1.18.1-so-3.12.1-ios","1.18.1-so-3.12.2b1-android","1.18.1-so-3.12.2b1-ios","1.18.1-so-3.12.4","1.18.1-so-3.12.6","1.19.0-rc1","1.19.0-rc1-so-3.12.7","1.2","1.20.0-rc1","1.21.0-rc1","1.22.0-rc1","1.23.0","1.23.0-rc1","1.24.0","1.24.0-rc1","1.25.0","1.25.0-rc1","1.25.0-rc2","1.25.1","1.25.2","1.25.3","1.25.4","1.25.5","1.25.6","1.3rc1","1.4","1.4-ios","1.5","1.5-ios","1.5-ios-appstore","1.5-ios-rc6","1.5-ios-rc7","1.5-ios-rc8","1.6","1.6-appstore","1.6-ios-rc1","1.6-ios-rc2","1.7","1.7-rc1","1.7a","1.8","1.9","1.9-rc1","1.9-rc2","1.9a","android-release-60"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-46206.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}