Home

Description

Versions of the package mammoth from 0.3.25 and before 1.11.0; versions of the package mammoth from 0.3.25 and before 1.11.0; versions of the package mammoth before 1.11.0; versions of the package org.zwobble.mammoth:mammoth before 1.11.0 are vulnerable to Directory Traversal due to the lack of path or file type validation when processing a docx file containing an image with an external link (r:link attribute instead of embedded r:embed). The library resolves the URI to a file path and after reading, the content is encoded as base64 and included in the HTML output as a data URI. An attacker can read arbitrary files on the system where the conversion is performed or cause an excessive resources consumption by crafting a docx file that links to special device files such as /dev/random or /dev/zero.

PUBLISHED Reserved 2025-10-16 | Published 2025-10-17 | Updated 2025-10-17 | Assigner snyk




MEDIUM: 6.4CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H/E:P
CRITICAL: 9.3CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:H/E:P

Problem types

Directory Traversal

Product status

0.3.25 before 1.11.0
affected

0.3.25 before 1.11.0
affected

Any version before 1.11.0
affected

Any version before 1.11.0
affected

Credits

Audun Wigum Arbo

References

security.snyk.io/vuln/SNYK-JS-MAMMOTH-13554470

security.snyk.io/vuln/SNYK-PYTHON-MAMMOTH-13561967

security.snyk.io/vuln/SNYK-DOTNET-MAMMOTH-13561968

security.snyk.io/vuln/SNYK-JAVA-ORGZWOBBLEMAMMOTH-13561969

gist.github.com/AudunWA/4d690d9ae5efdafe7cf71d9c2ee90a10

github.com/...ommit/c54aaeb43a7941317c1f3c119ffa92090f988820

cve.org (CVE-2025-11849)

nvd.nist.gov (CVE-2025-11849)

Download JSON