FKIE_CVE-2025-51591

Vulnerability from fkie_nvd - Published: 2025-07-11 14:15 - Updated: 2025-11-24 22:15
Summary
A Server-Side Request Forgery (SSRF) in JGM Pandoc v3.6.4 allows attackers to gain access to and compromise the whole infrastructure via injecting a crafted iframe. Note: Some users have stated that Pandoc by default can retrieve and parse untrusted HTML content which can enable SSRF vulnerabilities. Using the ‘--sandbox’ option or ‘pandoc-server’ can mitigate such vulnerabilities. Using pandoc with an external ‘--pdf-engine’ can also enable SSRF vulnerabilities, such as CVE-2022-35583 in wkhtmltopdf.
Impacted products
Vendor Product Version

{
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A Server-Side Request Forgery (SSRF) in JGM Pandoc v3.6.4 allows attackers to gain access to and compromise the whole infrastructure via injecting a crafted iframe. Note: Some users have stated that Pandoc by default can retrieve and parse untrusted HTML content which can enable SSRF vulnerabilities. Using the \u2018--sandbox\u2019 option or \u2018pandoc-server\u2019 can mitigate such vulnerabilities. Using pandoc with an external \u2018--pdf-engine\u2019 can also enable SSRF vulnerabilities, such as CVE-2022-35583 in wkhtmltopdf."
    },
    {
      "lang": "es",
      "value": "Server-Side Request Forgery (SSRF) en JGM Pandoc v3.6.4 permite a los atacantes obtener acceso y comprometer toda la infraestructura mediante la inyecci\u00f3n de un iframe manipulado espec\u00edficamente."
    }
  ],
  "id": "CVE-2025-51591",
  "lastModified": "2025-11-24T22:15:48.747",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 3.7,
          "baseSeverity": "LOW",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 1.4,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-07-11T14:15:27.347",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://jgm.com"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://pandoc.com"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://github.com/RealestName/Vulnerability-Research/tree/main/CVE-2025-51591"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://github.com/jgm/pandoc/discussions/11200"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://github.com/jgm/pandoc/issues/10682"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://github.com/jgm/pandoc/issues/11261"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://github.com/jgm/pandoc/issues/8874"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://github.com/jgm/pandoc/pull/11262"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.wiz.io/blog/imds-anomaly-hunting-zero-day"
    },
    {
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "url": "https://github.com/jgm/pandoc/commit/67edf7ce7cd3563a180ae44bd122b012e22364f8"
    },
    {
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "url": "https://github.com/jgm/pandoc/issues/10682"
    },
    {
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "url": "https://pandoc.org"
    },
    {
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "url": "https://www.wiz.io/blog/imds-anomaly-hunting-zero-day"
    },
    {
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "url": "not-applicable:http://jgm.com/"
    },
    {
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "url": "not-applicable:http://pandoc.com/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Awaiting Analysis",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-918"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…