Stirling-PDF is a locally hosted web application that performs various operations on PDF files. Prior to version 1.1.0, when using the /api/v1/convert/markdown/pdf endpoint to convert Markdown to PDF, the backend calls a third-party tool to process it and includes a sanitizer for security sanitization which can be bypassed and result in SSRF. This issue has been patched in version 1.1.0.
References
| Link | Resource |
|---|---|
| https://github.com/Stirling-Tools/Stirling-PDF/commit/7d6b70871bad2a3ff810825f7382c49f55293943 | Patch |
| https://github.com/Stirling-Tools/Stirling-PDF/security/advisories/GHSA-ff33-grr6-rmvp | Third Party Advisory Exploit |
Configurations
History
No history.
Information
Published : 2025-08-11 23:15
Updated : 2025-08-15 18:05
NVD link : CVE-2025-55161
Mitre link : CVE-2025-55161
CVE.ORG link : CVE-2025-55161
JSON object : View
Products Affected
stirlingpdf
- stirling_pdf
CWE
CWE-918
Server-Side Request Forgery (SSRF)
