Skip to main content

CVE-2025-46568: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF

High
VulnerabilityCVE-2025-46568cvecve-2025-46568cwe-918
Published: Thu May 01 2025 (05/01/2025, 17:20:46 UTC)
Source: CVE
Vendor/Project: Stirling-Tools
Product: Stirling-PDF

Description

Stirling-PDF is a locally hosted web application that allows you to perform various operations on PDF files. Prior to version 0.45.0, Stirling-PDF is vulnerable to SSRF-induced arbitrary file read. WeasyPrint redefines a set of HTML tags, including img, embed, object, and others. The references to several files inside, allow the attachment of content from any webpage or local file to a PDF. This allows the attacker to read any file on the server, including sensitive files and configuration files. All users utilizing this feature will be affected. This issue has been patched in version 0.45.0.

AI-Powered Analysis

AILast updated: 06/25/2025, 23:12:53 UTC

Technical Analysis

CVE-2025-46568 is a high-severity Server-Side Request Forgery (SSRF) vulnerability affecting Stirling-PDF, a locally hosted web application used for manipulating PDF files. The vulnerability exists in versions prior to 0.45.0. Stirling-PDF leverages WeasyPrint, which redefines several HTML tags such as img, embed, and object to allow embedding content from external webpages or local files into PDFs. Due to improper validation of these references, an attacker can exploit SSRF to induce arbitrary file reads on the server hosting Stirling-PDF. This enables unauthorized access to sensitive files, including configuration files and other critical data stored locally on the server. The vulnerability does not require authentication or user interaction, making it remotely exploitable over the network with low attack complexity. The CVSS 4.0 base score is 7.7 (high), reflecting the significant confidentiality impact and ease of exploitation. No known exploits have been reported in the wild yet. The issue was publicly disclosed on May 1, 2025, and patched in version 0.45.0 of Stirling-PDF. Organizations using affected versions should prioritize upgrading to the patched release to mitigate this risk. The vulnerability is particularly dangerous because it allows attackers to bypass typical access controls by leveraging SSRF to read arbitrary files, potentially exposing credentials, internal configurations, or other sensitive information that could facilitate further compromise.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, especially for those relying on Stirling-PDF for document processing in sensitive environments such as finance, healthcare, government, or critical infrastructure. Unauthorized file reads can lead to exposure of confidential data, including personally identifiable information (PII), intellectual property, or security credentials. This could result in data breaches, regulatory non-compliance (e.g., GDPR violations), reputational damage, and potential financial penalties. Additionally, attackers gaining insight into internal configurations may leverage this information for lateral movement or further exploitation within the network. Since Stirling-PDF is locally hosted, the attack surface is limited to internal networks or VPN-accessible environments, but remote exploitation without authentication increases risk. Organizations with automated PDF workflows or integration of Stirling-PDF in web-facing services are particularly vulnerable. The lack of known exploits in the wild suggests a window of opportunity for proactive defense, but also the potential for future exploitation once the vulnerability becomes widely known.

Mitigation Recommendations

1. Immediate upgrade to Stirling-PDF version 0.45.0 or later, where the SSRF vulnerability has been patched. 2. Implement strict input validation and sanitization on all user-supplied URLs or file references used in PDF generation workflows to prevent injection of malicious SSRF payloads. 3. Restrict network access for the Stirling-PDF server to only trusted internal resources; employ network segmentation and firewall rules to limit outbound HTTP requests from the application server. 4. Disable or tightly control the use of HTML tags that allow external content embedding (img, embed, object) if not strictly necessary for business processes. 5. Monitor logs for unusual file access patterns or unexpected outbound requests originating from the Stirling-PDF server. 6. Conduct regular security assessments and penetration tests focusing on SSRF and file read vulnerabilities in internal web applications. 7. Employ application-layer firewalls or runtime application self-protection (RASP) solutions that can detect and block SSRF attempts in real time. 8. Educate developers and system administrators about SSRF risks and secure coding practices related to file inclusion and URL handling.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-04-24T21:10:48.175Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d9838c4522896dcbec144

Added to database: 5/21/2025, 9:09:12 AM

Last enriched: 6/25/2025, 11:12:53 PM

Last updated: 8/11/2025, 6:14:22 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats