VYPR
High severity7.8NVD Advisory· Published Jul 15, 2025· Updated Apr 15, 2026

CVE-2025-6973

CVE-2025-6973

Description

Use After Free vulnerability exists in the JT file reading procedure in SOLIDWORKS eDrawings on Release SOLIDWORKS Desktop 2025. This vulnerability could allow an attacker to execute arbitrary code while opening a specially crafted JT file.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A use-after-free in SOLIDWORKS eDrawings' JT file reader lets attackers execute arbitrary code via a crafted JT file.

Vulnerability

Overview CVE-2025-6973 is a use-after-free vulnerability in the JT file reading procedure of SOLIDWORKS eDrawings, affecting SOLIDWORKS Desktop 2025. The flaw occurs when the application improperly handles memory during the parsing of specially crafted JT files, leading to a use-after-free condition [1].

Exploitation

An attacker can exploit this vulnerability by convincing a user to open a malicious JT file in the affected eDrawings application. No additional privileges are required beyond normal user access, and the attack can be triggered locally by opening the file. The vulnerability does not require network access beyond the initial file delivery vector [1].

Impact

Successful exploitation allows an attacker to execute arbitrary code in the context of the affected application. This could lead to full compromise of the user's system, including data exfiltration, further malware installation, or persistent access. The CVSS 3.1 severity rating of 7.8 (High) reflects the low complexity and high impact of the vulnerability [1].

Mitigation

As of the advisory publication on July 15, 2025, Dassault Systèmes has not released a patch for this vulnerability. Users are advised to exercise caution when opening JT files from untrusted sources. The vendor may provide updates on the security advisory page. No workarounds have been published, but limiting file exchange to trusted sources reduces risk [1].

References
  1. CVE-2025-6973

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.