Apache Tika is a popular open-source toolkit used by thousands of organizations to extract text and metadata from documents, including PDFs, Word files, and images.
Apache researchers have identified a critical flaw that attackers can exploit by embedding malicious code inside PDF files.
The vulnerability is caused by an XML External Entity (XXE) injection flaw. Attackers create PDF documents containing crafted XFA (XML Forms Architecture) files that trigger the vulnerability when Tika processes them.
This allows attackers to execute arbitrary code, steal sensitive information, or gain unauthorized access to systems.
The vulnerability affects three Apache Tika components across all operating systems:
| Field | Value |
|---|---|
| CVE ID | CVE-2025-66516 |
| CVSS Score | 9.8 (Critical) |
| Vulnerability Type | XML External Entity (XXE) Injection |
| Attack Vector | Malicious XFA files embedded in PDF documents |
| Affected Platforms | All (Windows, Linux, macOS) |
Tika-core: Versions 1.13 through 3.2.1 are vulnerable. This is the core library containing the actual flaw.
Tika-parsers: Versions 1.13 before 2.0.0 are affected. This older module contained the PDF parser functionality.
Tika PDF parser module: Versions 2.0.0 through 3.2.1 are vulnerable. This is the newer dedicated PDF component. This vulnerability expands beyond the original CVE-2025-54988 in critical ways.
First, while the vulnerability appeared to be related to the PDF parser module, the actual flaw lies in Tika-core. Organizations that only updated the PDF parser without upgrading Tika-core remain vulnerable to attack.
Second, the original report overlooked that older Tika 1.x releases packaged the PDF parser in the “tika-parsers” module rather than as a separate component.
This means legacy systems could be vulnerable even if users believed they had patched the issue. Immediate action is required: Upgrade Tika-core to version 3.2.2 or later. This single update addresses the vulnerability across all components.
Apache advises organizations using older 1.x versions to contact your software vendor immediately for patched releases. Do not wait for automatic updates.
As a temporary mitigation, restrict PDF file uploads from untrusted external sources until patching is complete.
Organizations that handle sensitive documents, financial records, legal papers, and personal data face an elevated risk from this vulnerability.
Apache Tika maintainers have released fixes, but deployment remains critical. Security teams should prioritize this patch in their vulnerability management processes.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post Critical Apache Tika Core Vulnerability Exploited by Uploading Malicious PDF appeared first on Cyber Security News.
2018 file photo The following is a news release from Fall River Electric. ASHTON –…
A photo of law enforcement staff on the steps of the Idaho Falls City Hall…
A once-trustworthy browser extension, QuickLens, which was a Google Lens wrapper, has been exploited to…
For years, botnets have shared a common weakness: centralized command-and-control (C2) infrastructure. Once security teams…
A fire broke out at the South End home of a downtown bakery owner over…
Nearly three decades ago, Rosalie Miller’s body was found off the Auburn stretch of the…
This website uses cookies.