Home

Description

A Server-Side Request Forgery (SSRF) in JGM Pandoc v3.6.4 allows attackers to gain access to and compromise the whole infrastructure via injecting a crafted iframe. Note: Some users have stated that Pandoc by default can retrieve and parse untrusted HTML content which can enable SSRF vulnerabilities. Using the ‘--sandbox’ option or ‘pandoc-server’ can mitigate such vulnerabilities. Using pandoc with an external ‘--pdf-engine’ can also enable SSRF vulnerabilities, such as CVE-2022-35583 in wkhtmltopdf.

PUBLISHED Reserved 2025-06-16 | Published 2025-07-11 | Updated 2025-11-24 | Assigner mitre

References

pandoc.org product

github.com/jgm/pandoc/issues/10682 vendor-advisory issue-tracking

github.com/...ommit/67edf7ce7cd3563a180ae44bd122b012e22364f8 patch

www.wiz.io/blog/imds-anomaly-hunting-zero-day technical-description

not-applicable

not-applicable

jgm.com

pandoc.com

github.com/...ulnerability-Research/tree/main/CVE-2025-51591

github.com/jgm/pandoc/issues/8874

github.com/jgm/pandoc/issues/10682

github.com/jgm/pandoc/discussions/11200

github.com/jgm/pandoc/issues/11261

github.com/jgm/pandoc/pull/11262

www.wiz.io/blog/imds-anomaly-hunting-zero-day

cve.org (CVE-2025-51591)

nvd.nist.gov (CVE-2025-51591)

Download JSON