CVE-2025-55150: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
Stirling-PDF is a locally hosted web application that performs various operations on PDF files. Prior to version 1.1.0, when using the /api/v1/convert/html/pdf endpoint to convert HTML to PDF, the backend calls a third-party tool to process it and includes a sanitizer for security sanitization which can be bypassed and result in SSRF. This issue has been patched in version 1.1.0.
AI Analysis
Technical Summary
CVE-2025-55150 is a high-severity Server-Side Request Forgery (SSRF) vulnerability affecting Stirling-PDF, a locally hosted web application designed to perform various PDF file operations. The vulnerability exists in versions prior to 1.1.0, specifically in the /api/v1/convert/html/pdf endpoint, which converts HTML content into PDF format. During this process, the backend invokes a third-party tool to handle the conversion. Although a sanitizer is implemented to secure this operation, it can be bypassed, allowing an attacker to craft malicious requests that cause the server to make unintended HTTP requests to internal or external resources. SSRF vulnerabilities like this can be exploited to access internal network services, potentially exposing sensitive data or enabling further attacks such as port scanning, internal service enumeration, or exploitation of other vulnerabilities within the network. The CVSS score of 8.6 (high) reflects the vulnerability's potential to compromise confidentiality (high impact), with limited impact on integrity and availability. Notably, exploitation requires no authentication or user interaction, and the attack can be performed remotely over the network. The issue was patched in version 1.1.0 of Stirling-PDF, and no known exploits are currently reported in the wild. However, the presence of this vulnerability in a web-facing or internally accessible application poses a significant risk if left unpatched.
Potential Impact
For European organizations, the impact of this SSRF vulnerability can be substantial, especially for those relying on Stirling-PDF for document processing within their internal infrastructure or exposed web services. Exploitation could lead to unauthorized access to internal systems, leakage of sensitive information, or pivoting to other critical assets within the network. This is particularly concerning for sectors with strict data protection requirements such as finance, healthcare, and government institutions, where exposure of confidential documents or internal resources could result in regulatory penalties under GDPR and damage to reputation. Additionally, SSRF can be leveraged to bypass network segmentation and firewall rules, increasing the attack surface. Organizations using versions of Stirling-PDF prior to 1.1.0 are at risk until they apply the patch. The lack of required authentication for exploitation means that even external attackers without credentials could potentially leverage this vulnerability if the application is accessible externally or via VPN.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately upgrade Stirling-PDF to version 1.1.0 or later, where the SSRF issue has been patched. If immediate upgrading is not feasible, organizations should implement strict network-level controls to restrict the server's outbound HTTP requests, limiting them only to trusted destinations. Employing web application firewalls (WAFs) with rules to detect and block SSRF patterns can provide additional protection. Furthermore, review and harden the configuration of the third-party tool used for HTML to PDF conversion to ensure it does not allow arbitrary URL fetching. Conduct internal network segmentation to isolate the PDF processing server from sensitive internal resources. Regularly audit logs for unusual outbound requests originating from the application. Finally, incorporate SSRF-specific detection in security monitoring and incident response plans to quickly identify and respond to exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-55150: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
Description
Stirling-PDF is a locally hosted web application that performs various operations on PDF files. Prior to version 1.1.0, when using the /api/v1/convert/html/pdf endpoint to convert HTML to PDF, the backend calls a third-party tool to process it and includes a sanitizer for security sanitization which can be bypassed and result in SSRF. This issue has been patched in version 1.1.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-55150 is a high-severity Server-Side Request Forgery (SSRF) vulnerability affecting Stirling-PDF, a locally hosted web application designed to perform various PDF file operations. The vulnerability exists in versions prior to 1.1.0, specifically in the /api/v1/convert/html/pdf endpoint, which converts HTML content into PDF format. During this process, the backend invokes a third-party tool to handle the conversion. Although a sanitizer is implemented to secure this operation, it can be bypassed, allowing an attacker to craft malicious requests that cause the server to make unintended HTTP requests to internal or external resources. SSRF vulnerabilities like this can be exploited to access internal network services, potentially exposing sensitive data or enabling further attacks such as port scanning, internal service enumeration, or exploitation of other vulnerabilities within the network. The CVSS score of 8.6 (high) reflects the vulnerability's potential to compromise confidentiality (high impact), with limited impact on integrity and availability. Notably, exploitation requires no authentication or user interaction, and the attack can be performed remotely over the network. The issue was patched in version 1.1.0 of Stirling-PDF, and no known exploits are currently reported in the wild. However, the presence of this vulnerability in a web-facing or internally accessible application poses a significant risk if left unpatched.
Potential Impact
For European organizations, the impact of this SSRF vulnerability can be substantial, especially for those relying on Stirling-PDF for document processing within their internal infrastructure or exposed web services. Exploitation could lead to unauthorized access to internal systems, leakage of sensitive information, or pivoting to other critical assets within the network. This is particularly concerning for sectors with strict data protection requirements such as finance, healthcare, and government institutions, where exposure of confidential documents or internal resources could result in regulatory penalties under GDPR and damage to reputation. Additionally, SSRF can be leveraged to bypass network segmentation and firewall rules, increasing the attack surface. Organizations using versions of Stirling-PDF prior to 1.1.0 are at risk until they apply the patch. The lack of required authentication for exploitation means that even external attackers without credentials could potentially leverage this vulnerability if the application is accessible externally or via VPN.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately upgrade Stirling-PDF to version 1.1.0 or later, where the SSRF issue has been patched. If immediate upgrading is not feasible, organizations should implement strict network-level controls to restrict the server's outbound HTTP requests, limiting them only to trusted destinations. Employing web application firewalls (WAFs) with rules to detect and block SSRF patterns can provide additional protection. Furthermore, review and harden the configuration of the third-party tool used for HTML to PDF conversion to ensure it does not allow arbitrary URL fetching. Conduct internal network segmentation to isolate the PDF processing server from sensitive internal resources. Regularly audit logs for unusual outbound requests originating from the application. Finally, incorporate SSRF-specific detection in security monitoring and incident response plans to quickly identify and respond to exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-08-07T18:27:23.305Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 689a6886ad5a09ad002967b9
Added to database: 8/11/2025, 10:02:46 PM
Last enriched: 8/19/2025, 1:43:28 AM
Last updated: 8/20/2025, 5:48:38 PM
Views: 29
Related Threats
CVE-2025-43300: Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals. in Apple macOS
UnknownCVE-2025-57748
LowCVE-2025-57747
LowCVE-2025-57746
LowCVE-2025-57745
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.