The Apache Software Foundation: Apache Tika hit by critical vulnerability thought to be patched months ago

The Apache Software Foundation: Apache Tika hit by critical vulnerability thought to be patched months ago

A security flaw in the widely-used Apache Tika XML document extraction utility, originally made public last summer, is wider in scope and more serious than first thought, the project’s maintainers have warned.

Their new alert relates to two entwined flaws, the first CVE-2025-54988 from August, rated 8.4 in severity, and the second, CVE-2025-66516 made public last week, rated 10.

CVE-2025-54988 is a weakness in the tika-parser-pdf-module used to process PDFs in Apache Tika from version 1.13 to and including version 3.2.1. It is one module in Tika’s wider ecosystem that is used to normalize data from 1,000 proprietary formats so that software tools can index and read them.

Source: https://www.csoonline.com/article/4102655/apache-tika-hit-by-critical-vulnerability-thought-to-be-patched-months-ago.html

The Apache Software Foundation cybersecurity rating report: https://www.rankiteo.com/company/the-apache-software-foundation

"id": "THE1765231837",
"linkid": "the-apache-software-foundation",
"type": "Vulnerability",
"date": "12/2025",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization's existence"
{'affected_entities': [{'customers_affected': None,
                                     'industry': 'Technology/Software',
                                     'location': None,
                                     'name': 'Apache Tika',
                                     'size': None,
                                     'type': 'Software Utility'}],
              'attack_vector': 'Malicious PDF Processing',
              'data_breach': {'data_encryption': None,
                              'data_exfiltration': None,
                              'file_types_exposed': ['PDF'],
                              'number_of_records_exposed': None,
                              'personally_identifiable_information': None,
                              'sensitivity_of_data': None,
                              'type_of_data_compromised': None},
              'description': 'A security flaw in the widely-used Apache Tika '
                             'XML document extraction utility, originally made '
                             'public last summer, is wider in scope and more '
                             'serious than first thought. The new alert '
                             'relates to two entwined flaws: CVE-2025-54988 '
                             '(rated 8.4) and CVE-2025-66516 (rated 10). '
                             'CVE-2025-54988 is a weakness in the '
                             'tika-parser-pdf-module used to process PDFs in '
                             'Apache Tika from version 1.13 to 3.2.1.',
              'impact': {'brand_reputation_impact': None,
                         'conversion_rate_impact': None,
                         'customer_complaints': None,
                         'data_compromised': None,
                         'downtime': None,
                         'financial_loss': None,
                         'identity_theft_risk': None,
                         'legal_liabilities': None,
                         'operational_impact': None,
                         'payment_information_risk': None,
                         'revenue_loss': None,
                         'systems_affected': 'Apache Tika versions 1.13 to '
                                             '3.2.1'},
              'initial_access_broker': {'backdoors_established': None,
                                        'data_sold_on_dark_web': None,
                                        'entry_point': None,
                                        'high_value_targets': None,
                                        'reconnaissance_period': None},
              'post_incident_analysis': {'corrective_actions': None,
                                         'root_causes': 'Weakness in '
                                                        'tika-parser-pdf-module '
                                                        'for PDF processing'},
              'ransomware': {'data_encryption': None,
                             'data_exfiltration': None,
                             'ransom_demanded': None,
                             'ransom_paid': None,
                             'ransomware_strain': None},
              'references': [{'date_accessed': None,
                              'source': 'Apache Tika Project',
                              'url': None}],
              'regulatory_compliance': {'fines_imposed': None,
                                        'legal_actions': None,
                                        'regulations_violated': None,
                                        'regulatory_notifications': None},
              'response': {'adaptive_behavioral_waf': None,
                           'communication_strategy': None,
                           'containment_measures': None,
                           'enhanced_monitoring': None,
                           'incident_response_plan_activated': None,
                           'law_enforcement_notified': None,
                           'network_segmentation': None,
                           'on_demand_scrubbing_services': None,
                           'recovery_measures': None,
                           'remediation_measures': None,
                           'third_party_assistance': None},
              'title': 'Apache Tika XML Document Extraction Utility Security '
                       'Flaws',
              'type': 'Vulnerability Exploitation',
              'vulnerability_exploited': ['CVE-2025-54988', 'CVE-2025-66516']}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.