🔐 CVE Alert

CVE-2019-25550

MEDIUM 6.2

Encrypt PDF 2.3 Denial of Service via Buffer Overflow

CVSS Score
6.2
EPSS Score
0.0%
EPSS Percentile
0th

Encrypt PDF 2.3 contains a buffer overflow vulnerability that allows local attackers to crash the application by inputting excessively long strings into password fields. Attackers can paste a 1000-byte buffer into the User Password or Master Password field in the Settings dialog to trigger an application crash when importing PDF files.

CWE CWE-787
Vendor verypdf
Product encrypt pdf
Published Mar 21, 2026
Last Updated Mar 23, 2026
Stay Ahead of the Next One

Get instant alerts for verypdf encrypt pdf

Be the first to know when new medium vulnerabilities affecting verypdf encrypt pdf are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Affected Versions

Verypdf / Encrypt PDF
2.3

References

NVD ↗ CVE.org ↗ EPSS Data ↗
exploit-db.com: https://www.exploit-db.com/exploits/46871 verypdf.com: http://www.verypdf.com vulncheck.com: https://www.vulncheck.com/advisories/encrypt-pdf-denial-of-service-via-buffer-overflow

Credits

Alejandra Sánchez