CVE-2025-46568: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
Stirling-PDF is a locally hosted web application that allows you to perform various operations on PDF files. Prior to version 0.45.0, Stirling-PDF is vulnerable to SSRF-induced arbitrary file read. WeasyPrint redefines a set of HTML tags, including img, embed, object, and others. The references to several files inside, allow the attachment of content from any webpage or local file to a PDF. This allows the attacker to read any file on the server, including sensitive files and configuration files. All users utilizing this feature will be affected. This issue has been patched in version 0.45.0.
AI Analysis
Technical Summary
CVE-2025-46568 is a high-severity Server-Side Request Forgery (SSRF) vulnerability affecting Stirling-PDF, a locally hosted web application used for manipulating PDF files. The vulnerability exists in versions prior to 0.45.0. Stirling-PDF leverages WeasyPrint, which redefines several HTML tags such as img, embed, and object to allow embedding content from external webpages or local files into PDFs. Due to improper validation of these references, an attacker can exploit SSRF to induce arbitrary file reads on the server hosting Stirling-PDF. This enables unauthorized access to sensitive files, including configuration files and other critical data stored locally on the server. The vulnerability does not require authentication or user interaction, making it remotely exploitable over the network with low attack complexity. The CVSS 4.0 base score is 7.7 (high), reflecting the significant confidentiality impact and ease of exploitation. No known exploits have been reported in the wild yet. The issue was publicly disclosed on May 1, 2025, and patched in version 0.45.0 of Stirling-PDF. Organizations using affected versions should prioritize upgrading to the patched release to mitigate this risk. The vulnerability is particularly dangerous because it allows attackers to bypass typical access controls by leveraging SSRF to read arbitrary files, potentially exposing credentials, internal configurations, or other sensitive information that could facilitate further compromise.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for those relying on Stirling-PDF for document processing in sensitive environments such as finance, healthcare, government, or critical infrastructure. Unauthorized file reads can lead to exposure of confidential data, including personally identifiable information (PII), intellectual property, or security credentials. This could result in data breaches, regulatory non-compliance (e.g., GDPR violations), reputational damage, and potential financial penalties. Additionally, attackers gaining insight into internal configurations may leverage this information for lateral movement or further exploitation within the network. Since Stirling-PDF is locally hosted, the attack surface is limited to internal networks or VPN-accessible environments, but remote exploitation without authentication increases risk. Organizations with automated PDF workflows or integration of Stirling-PDF in web-facing services are particularly vulnerable. The lack of known exploits in the wild suggests a window of opportunity for proactive defense, but also the potential for future exploitation once the vulnerability becomes widely known.
Mitigation Recommendations
1. Immediate upgrade to Stirling-PDF version 0.45.0 or later, where the SSRF vulnerability has been patched. 2. Implement strict input validation and sanitization on all user-supplied URLs or file references used in PDF generation workflows to prevent injection of malicious SSRF payloads. 3. Restrict network access for the Stirling-PDF server to only trusted internal resources; employ network segmentation and firewall rules to limit outbound HTTP requests from the application server. 4. Disable or tightly control the use of HTML tags that allow external content embedding (img, embed, object) if not strictly necessary for business processes. 5. Monitor logs for unusual file access patterns or unexpected outbound requests originating from the Stirling-PDF server. 6. Conduct regular security assessments and penetration tests focusing on SSRF and file read vulnerabilities in internal web applications. 7. Employ application-layer firewalls or runtime application self-protection (RASP) solutions that can detect and block SSRF attempts in real time. 8. Educate developers and system administrators about SSRF risks and secure coding practices related to file inclusion and URL handling.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Austria
CVE-2025-46568: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
Description
Stirling-PDF is a locally hosted web application that allows you to perform various operations on PDF files. Prior to version 0.45.0, Stirling-PDF is vulnerable to SSRF-induced arbitrary file read. WeasyPrint redefines a set of HTML tags, including img, embed, object, and others. The references to several files inside, allow the attachment of content from any webpage or local file to a PDF. This allows the attacker to read any file on the server, including sensitive files and configuration files. All users utilizing this feature will be affected. This issue has been patched in version 0.45.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-46568 is a high-severity Server-Side Request Forgery (SSRF) vulnerability affecting Stirling-PDF, a locally hosted web application used for manipulating PDF files. The vulnerability exists in versions prior to 0.45.0. Stirling-PDF leverages WeasyPrint, which redefines several HTML tags such as img, embed, and object to allow embedding content from external webpages or local files into PDFs. Due to improper validation of these references, an attacker can exploit SSRF to induce arbitrary file reads on the server hosting Stirling-PDF. This enables unauthorized access to sensitive files, including configuration files and other critical data stored locally on the server. The vulnerability does not require authentication or user interaction, making it remotely exploitable over the network with low attack complexity. The CVSS 4.0 base score is 7.7 (high), reflecting the significant confidentiality impact and ease of exploitation. No known exploits have been reported in the wild yet. The issue was publicly disclosed on May 1, 2025, and patched in version 0.45.0 of Stirling-PDF. Organizations using affected versions should prioritize upgrading to the patched release to mitigate this risk. The vulnerability is particularly dangerous because it allows attackers to bypass typical access controls by leveraging SSRF to read arbitrary files, potentially exposing credentials, internal configurations, or other sensitive information that could facilitate further compromise.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for those relying on Stirling-PDF for document processing in sensitive environments such as finance, healthcare, government, or critical infrastructure. Unauthorized file reads can lead to exposure of confidential data, including personally identifiable information (PII), intellectual property, or security credentials. This could result in data breaches, regulatory non-compliance (e.g., GDPR violations), reputational damage, and potential financial penalties. Additionally, attackers gaining insight into internal configurations may leverage this information for lateral movement or further exploitation within the network. Since Stirling-PDF is locally hosted, the attack surface is limited to internal networks or VPN-accessible environments, but remote exploitation without authentication increases risk. Organizations with automated PDF workflows or integration of Stirling-PDF in web-facing services are particularly vulnerable. The lack of known exploits in the wild suggests a window of opportunity for proactive defense, but also the potential for future exploitation once the vulnerability becomes widely known.
Mitigation Recommendations
1. Immediate upgrade to Stirling-PDF version 0.45.0 or later, where the SSRF vulnerability has been patched. 2. Implement strict input validation and sanitization on all user-supplied URLs or file references used in PDF generation workflows to prevent injection of malicious SSRF payloads. 3. Restrict network access for the Stirling-PDF server to only trusted internal resources; employ network segmentation and firewall rules to limit outbound HTTP requests from the application server. 4. Disable or tightly control the use of HTML tags that allow external content embedding (img, embed, object) if not strictly necessary for business processes. 5. Monitor logs for unusual file access patterns or unexpected outbound requests originating from the Stirling-PDF server. 6. Conduct regular security assessments and penetration tests focusing on SSRF and file read vulnerabilities in internal web applications. 7. Employ application-layer firewalls or runtime application self-protection (RASP) solutions that can detect and block SSRF attempts in real time. 8. Educate developers and system administrators about SSRF risks and secure coding practices related to file inclusion and URL handling.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-04-24T21:10:48.175Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d9838c4522896dcbec144
Added to database: 5/21/2025, 9:09:12 AM
Last enriched: 6/25/2025, 11:12:53 PM
Last updated: 8/11/2025, 6:14:22 AM
Views: 13
Related Threats
CVE-2025-8950: SQL Injection in Campcodes Online Recruitment Management System
MediumCVE-2025-27388: CWE-20 Improper Input Validation in OPPO OPPO HEALTH APP
HighCVE-2025-8949: Stack-based Buffer Overflow in D-Link DIR-825
HighCVE-2025-8948: SQL Injection in projectworlds Visitor Management System
MediumCVE-2025-8947: SQL Injection in projectworlds Visitor Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.