CVE-2025-2753

A vulnerability was found in Open Asset Import Library Assimp 5.4.3. It has been classified as critical. Affected is the function SceneCombiner::MergeScenes of the file code/AssetLib/LWS/LWSLoader.cpp of the component LWS File Handler. The manipulation leads to out-of-bounds read. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/assimp/assimp/issues/6014 Exploit Issue Tracking
https://github.com/assimp/assimp/issues/6014#issue-2877372462 Exploit Issue Tracking
https://vuldb.com/?ctiid.300858 Permissions Required VDB Entry
https://vuldb.com/?id.300858 Third Party Advisory VDB Entry
https://vuldb.com/?submit.517787 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:assimp:assimp:5.4.3:*:*:*:*:*:*:*

History

17 Jul 2025, 21:50

Type Values Removed Values Added
CPE cpe:2.3:a:assimp:assimp:5.4.3:*:*:*:*:*:*:*
First Time Assimp assimp
Assimp
References () https://github.com/assimp/assimp/issues/6014 - () https://github.com/assimp/assimp/issues/6014 - Exploit, Issue Tracking
References () https://github.com/assimp/assimp/issues/6014#issue-2877372462 - () https://github.com/assimp/assimp/issues/6014#issue-2877372462 - Exploit, Issue Tracking
References () https://vuldb.com/?ctiid.300858 - () https://vuldb.com/?ctiid.300858 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.300858 - () https://vuldb.com/?id.300858 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.517787 - () https://vuldb.com/?submit.517787 - Third Party Advisory, VDB Entry

27 Mar 2025, 16:45

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en Open Asset Import Library Assimp 5.4.3. Se ha clasificado como crítica. La función SceneCombiner::MergeScenes del archivo code/AssetLib/LWS/LWSLoader.cpp del componente LWS File Handler se ve afectada. La manipulación provoca lecturas fuera de los límites permitidos. Es posible ejecutar el ataque de forma remota. Se ha hecho público el exploit y puede que sea utilizado.

25 Mar 2025, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-25 09:15

Updated : 2025-07-17 21:50


NVD link : CVE-2025-2753

Mitre link : CVE-2025-2753

CVE.ORG link : CVE-2025-2753


JSON object : View

Products Affected

assimp

  • assimp
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-125

Out-of-bounds Read