Description

Nitro PDF Pro for Windows 14.41.1.4 contains a NULL pointer dereference vulnerability in the JavaScript implementation of app.alert(). When app.alert() is called with more than one argument and the first argument evaluates to null (for example, app.alert(app.activeDocs, true) when app.activeDocs is null), the engine routes the call through a fallback path intended for non-string arguments. In this path, js_ValueToString() is invoked on the null value and returns an invalid string pointer, which is then passed to JS_GetStringChars() without validation. Dereferencing this pointer leads to an access violation and application crash when opening a crafted PDF.

INFO

Published Date :

2026-04-13T00:00:00.000Z

Last Modified :

2026-04-13T19:01:40.478Z

Source :

mitre
AFFECTED PRODUCTS

The following products are affected by CVE-2025-69624 vulnerability.

Vendors Products
Gonitro
  • Nitro Pdf Pro
Microsoft
  • Windows
Nitro
  • Pdf Pro
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-69624.

URL Resource
http://nitro.com cve-icon cve-icon

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact