Description
A Server-Side Request Forgery (SSRF) in JGM Pandoc v3.6.4 allows attackers to gain access to and compromise the whole infrastructure via injecting a crafted iframe. Note: Some users have stated that Pandoc by default can retrieve and parse untrusted HTML content which can enable SSRF vulnerabilities. Using the ‘--sandbox’ option or ‘pandoc-server’ can mitigate such vulnerabilities. Using pandoc with an external ‘--pdf-engine’ can also enable SSRF vulnerabilities, such as CVE-2022-35583 in wkhtmltopdf.
References
pandoc.org
github.com/jgm/pandoc/issues/10682
github.com/...ommit/67edf7ce7cd3563a180ae44bd122b012e22364f8
www.wiz.io/blog/imds-anomaly-hunting-zero-day
github.com/...ulnerability-Research/tree/main/CVE-2025-51591
github.com/jgm/pandoc/issues/8874
github.com/jgm/pandoc/issues/10682
github.com/jgm/pandoc/discussions/11200
github.com/jgm/pandoc/issues/11261
github.com/jgm/pandoc/pull/11262
www.wiz.io/blog/imds-anomaly-hunting-zero-day