Home

Description

Versions of the package mammoth from 0.3.25 and before 1.11.0; versions of the package mammoth from 0.3.25 and before 1.11.0; versions of the package mammoth before 1.11.0; versions of the package org.zwobble.mammoth:mammoth before 1.11.0 are vulnerable to Directory Traversal due to the lack of path or file type validation when processing a docx file containing an image with an external link (r:link attribute instead of embedded r:embed). The library resolves the URI to a file path and after reading, the content is encoded as base64 and included in the HTML output as a data URI. An attacker can read arbitrary files on the system where the conversion is performed or cause an excessive resources consumption by crafting a docx file that links to special device files such as /dev/random or /dev/zero.

PUBLISHED Reserved 2025-10-16 | Published 2025-10-17 | Updated 2025-10-17 | Assigner snyk




MEDIUM: 6.4CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H/E:P
CRITICAL: 9.3CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:H/E:P

Problem types

Directory Traversal

Product status

0.3.25 (semver) before 1.11.0
affected

0.3.25 (semver) before 1.11.0
affected

Any version before 1.11.0
affected

Any version before 1.11.0
affected

Credits

Audun Wigum Arbo

References

gist.github.com/AudunWA/4d690d9ae5efdafe7cf71d9c2ee90a10 exploit

security.snyk.io/vuln/SNYK-JS-MAMMOTH-13554470

security.snyk.io/vuln/SNYK-PYTHON-MAMMOTH-13561967

security.snyk.io/vuln/SNYK-DOTNET-MAMMOTH-13561968

security.snyk.io/vuln/SNYK-JAVA-ORGZWOBBLEMAMMOTH-13561969

gist.github.com/AudunWA/4d690d9ae5efdafe7cf71d9c2ee90a10

github.com/...ommit/c54aaeb43a7941317c1f3c119ffa92090f988820

cve.org (CVE-2025-11849)

nvd.nist.gov (CVE-2025-11849)

Download JSON