Open Nav
Sign Up

Facebook FreeType Flaw Exploited in Attacks (CVE-2025-27363)

CVE-2025-27363

Filip Dimitrov

March 13, 2025

Security researchers and Meta have reported active exploitation of a high-severity vulnerability (CVE-2025-27363) affecting the FreeType font rendering library, commonly used across numerous applications, including Facebook.

The vulnerability arises from an out-of-bounds write error when parsing font subglyph structures, specifically related to TrueType GX and variable font files. Exploitation allows attackers to execute arbitrary code remotely by manipulating font rendering processes.

Technical Details

Severity: High (CVSS 8.1

The vulnerability occurs due to improper assignment of a signed short value to an unsigned long integer during heap buffer allocation. This results in a wraparound and leads to the allocation of a heap buffer smaller than required. Attackers exploiting this flaw can write up to six signed long integers out-of-bounds, enabling arbitrary code execution.

Affected Versions

  • FreeType ≤ 2.13.0
  • Patched version:  2.13.3

Impact

Due to FreeType’s widespread use in major operating systems (Linux, Android), game engines, GUI frameworks, web browsers, and platforms such as Facebook, successful exploitation of this vulnerability can lead to substantial security breaches, including unauthorized access, remote code execution, and full system compromise. 

Prompt mitigation measures are essential to prevent severe operational disruptions and potential data breaches.

Recommendations

  • Immediately update FreeType to version 2.13.0 or higher.
  • Audit software projects and environments for legacy FreeType versions to ensure they are not inadvertently still in use.

Additional Resources

Under Cyber Attack?

Fill out the form and we will contact you immediately.