We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-55161

Stirling-PDF SSRF vulnerability on /api/v1/convert/markdown/pdf



Description

Stirling-PDF is a locally hosted web application that performs various operations on PDF files. Prior to version 1.1.0, when using the /api/v1/convert/markdown/pdf endpoint to convert Markdown to PDF, the backend calls a third-party tool to process it and includes a sanitizer for security sanitization which can be bypassed and result in SSRF. This issue has been patched in version 1.1.0.

Reserved 2025-08-07 | Published 2025-08-11 | Updated 2025-08-11 | Assigner GitHub_M


HIGH: 8.6CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L

Problem types

CWE-918: Server-Side Request Forgery (SSRF)

Product status

< 1.1.0
affected

References

github.com/...ng-PDF/security/advisories/GHSA-ff33-grr6-rmvp

github.com/...ommit/7d6b70871bad2a3ff810825f7382c49f55293943

cve.org (CVE-2025-55161)

nvd.nist.gov (CVE-2025-55161)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-55161

Support options

Helpdesk Chat, Email, Knowledgebase