Apache Tika Hit by Critical XXE Bug (CVE-2025-66516, CVSS 10.0)
- Dec 5, 2025
- 2 min read
Key Findings
A critical XML external entity (XXE) vulnerability, tracked as CVE-2025-66516, has been discovered in the Apache Tika toolkit.
The vulnerability has a CVSS score of 10.0, indicating maximum severity.
The flaw allows attackers to carry out XXE injection attacks by exploiting a crafted XFA file within a PDF document.
The vulnerability affects multiple Apache Tika components, including the tika-core, tika-parser-pdf-module, and tika-parsers modules.
This vulnerability is an expansion of a previously disclosed flaw, CVE-2025-54988, with a wider scope of affected packages.
Background
The Apache Tika toolkit is an industry-standard content detection and analysis framework, used for detecting and extracting metadata from a wide range of file types. The toolkit's versatility makes it a valuable tool for various applications, including search engine indexing, content analysis, and translation.
Vulnerability Details
The critical XXE vulnerability, CVE-2025-66516, is found in the way Apache Tika handles XFA (XML Forms Architecture) data within PDF files. By embedding a malicious XML payload in the XFA section of a PDF document, an attacker can trick the Tika core into processing external entities, leading to potential disclosure of sensitive data, denial of service, or server-side request forgery (SSRF) attacks.
Affected Components
The vulnerability impacts the following Apache Tika components:
Apache Tika Core: Versions 1.13 through 3.2.1 (Patched in version 3.2.2)
Apache Tika Parsers: Versions 1.13 before 2.0.0 (Patched in version 2.0.0)
Apache Tika PDF Parser Module: Versions 2.0.0 through 3.2.1 (Patched in version 3.2.2)
Confusion and Correction
This vulnerability is a correction and expansion of a previously disclosed flaw, CVE-2025-54988, which had a CVSS score of 8.4. The Apache Tika team realized that the original report underestimated the scope of the vulnerability, as the fix was required in the tika-core module, not just the tika-parser-pdf-module.
Mitigation and Recommendations
To mitigate the risk of this critical vulnerability, users are advised to upgrade their dependencies to the patched versions of the affected Apache Tika components as soon as possible:
tika-core: Version 3.2.2 or higher
tika-parsers: Version 2.0.0 or higher
tika-parser-pdf-module: Version 3.2.2 or higher
Applying these updates is crucial, as users who only updated the tika-parser-pdf-module but not the tika-core module would still be vulnerable.
Sources
https://thehackernews.com/2025/12/critical-xxe-bug-cve-2025-66516-cvss.html
https://securityonline.info/the-pdf-trap-critical-vulnerability-cve-2025-66516-cvss-10-0-hits-apache-tika-core/


Comments