CVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
Stirling-PDF is a locally hosted web application that performs various operations on PDF files. Prior to version 1.1.0, the "convert file to pdf" functionality (/api/v1/convert/file/pdf) uses LibreOffice's unoconvert tool for conversion, and SSRF vulnerabilities exist during the conversion process. This issue has been patched in version 1.1.0.
AI Analysis
Technical Summary
CVE-2025-55151 is a high-severity Server-Side Request Forgery (SSRF) vulnerability identified in Stirling-Tools' Stirling-PDF application, specifically affecting versions prior to 1.1.0. Stirling-PDF is a locally hosted web application designed to perform various PDF file operations, including converting files to PDF format. The vulnerable functionality resides in the endpoint /api/v1/convert/file/pdf, which leverages LibreOffice's unoconvert tool for file conversion. During this conversion process, the application fails to properly validate or sanitize user-supplied input, allowing an attacker to craft malicious requests that cause the server to initiate unintended network requests to internal or external resources. SSRF vulnerabilities like CWE-918 enable attackers to bypass network access controls, potentially accessing sensitive internal services, metadata endpoints, or other protected resources that are not directly exposed to the internet. The CVSS v3.1 score of 8.6 reflects the high impact of this vulnerability, with an attack vector of network (AV:N), no privileges required (PR:N), and no user interaction needed (UI:N). The impact on confidentiality is high, as attackers can retrieve sensitive data from internal systems. Integrity impact is low, and availability impact is low but present. The vulnerability was patched in version 1.1.0 of Stirling-PDF, indicating that upgrading to this or later versions mitigates the risk. No known exploits are currently reported in the wild, but the ease of exploitation and potential impact warrant immediate attention.
Potential Impact
For European organizations, the SSRF vulnerability in Stirling-PDF poses significant risks, especially for entities relying on this tool for document processing within internal networks. Exploitation could allow attackers to access internal services, including databases, administrative interfaces, or cloud metadata services, potentially leading to data breaches or lateral movement within the network. Confidentiality of sensitive documents and internal infrastructure information is at risk. Given the vulnerability requires no authentication or user interaction, attackers can remotely exploit exposed instances, increasing the threat surface. Organizations in sectors such as finance, healthcare, government, and critical infrastructure, which often handle sensitive documents and may deploy such tools internally, face heightened risk. Additionally, the use of LibreOffice's unoconvert tool as part of the conversion process means that any misconfiguration or exposure of Stirling-PDF to untrusted networks could exacerbate the impact. The lack of known exploits in the wild provides a window for proactive mitigation, but the high CVSS score and ease of exploitation necessitate urgent patching and network controls.
Mitigation Recommendations
European organizations should implement the following specific mitigation measures: 1) Immediately upgrade Stirling-PDF installations to version 1.1.0 or later, where the SSRF vulnerability has been patched. 2) Restrict network access to the Stirling-PDF service, ensuring it is not exposed to untrusted networks or the public internet. 3) Implement strict egress filtering on servers running Stirling-PDF to prevent unauthorized outbound requests, limiting the ability of SSRF attacks to reach internal or external targets. 4) Employ application-layer firewall rules or web application firewalls (WAFs) to detect and block suspicious request patterns targeting the /api/v1/convert/file/pdf endpoint. 5) Conduct internal audits to identify any instances of Stirling-PDF in use, including shadow IT deployments, to ensure all are updated or isolated. 6) Monitor logs for unusual outbound requests or access patterns indicative of SSRF exploitation attempts. 7) Consider network segmentation to isolate document processing servers from sensitive internal resources. 8) Educate development and IT teams about SSRF risks and secure coding practices to prevent similar vulnerabilities in custom integrations.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
Description
Stirling-PDF is a locally hosted web application that performs various operations on PDF files. Prior to version 1.1.0, the "convert file to pdf" functionality (/api/v1/convert/file/pdf) uses LibreOffice's unoconvert tool for conversion, and SSRF vulnerabilities exist during the conversion process. This issue has been patched in version 1.1.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-55151 is a high-severity Server-Side Request Forgery (SSRF) vulnerability identified in Stirling-Tools' Stirling-PDF application, specifically affecting versions prior to 1.1.0. Stirling-PDF is a locally hosted web application designed to perform various PDF file operations, including converting files to PDF format. The vulnerable functionality resides in the endpoint /api/v1/convert/file/pdf, which leverages LibreOffice's unoconvert tool for file conversion. During this conversion process, the application fails to properly validate or sanitize user-supplied input, allowing an attacker to craft malicious requests that cause the server to initiate unintended network requests to internal or external resources. SSRF vulnerabilities like CWE-918 enable attackers to bypass network access controls, potentially accessing sensitive internal services, metadata endpoints, or other protected resources that are not directly exposed to the internet. The CVSS v3.1 score of 8.6 reflects the high impact of this vulnerability, with an attack vector of network (AV:N), no privileges required (PR:N), and no user interaction needed (UI:N). The impact on confidentiality is high, as attackers can retrieve sensitive data from internal systems. Integrity impact is low, and availability impact is low but present. The vulnerability was patched in version 1.1.0 of Stirling-PDF, indicating that upgrading to this or later versions mitigates the risk. No known exploits are currently reported in the wild, but the ease of exploitation and potential impact warrant immediate attention.
Potential Impact
For European organizations, the SSRF vulnerability in Stirling-PDF poses significant risks, especially for entities relying on this tool for document processing within internal networks. Exploitation could allow attackers to access internal services, including databases, administrative interfaces, or cloud metadata services, potentially leading to data breaches or lateral movement within the network. Confidentiality of sensitive documents and internal infrastructure information is at risk. Given the vulnerability requires no authentication or user interaction, attackers can remotely exploit exposed instances, increasing the threat surface. Organizations in sectors such as finance, healthcare, government, and critical infrastructure, which often handle sensitive documents and may deploy such tools internally, face heightened risk. Additionally, the use of LibreOffice's unoconvert tool as part of the conversion process means that any misconfiguration or exposure of Stirling-PDF to untrusted networks could exacerbate the impact. The lack of known exploits in the wild provides a window for proactive mitigation, but the high CVSS score and ease of exploitation necessitate urgent patching and network controls.
Mitigation Recommendations
European organizations should implement the following specific mitigation measures: 1) Immediately upgrade Stirling-PDF installations to version 1.1.0 or later, where the SSRF vulnerability has been patched. 2) Restrict network access to the Stirling-PDF service, ensuring it is not exposed to untrusted networks or the public internet. 3) Implement strict egress filtering on servers running Stirling-PDF to prevent unauthorized outbound requests, limiting the ability of SSRF attacks to reach internal or external targets. 4) Employ application-layer firewall rules or web application firewalls (WAFs) to detect and block suspicious request patterns targeting the /api/v1/convert/file/pdf endpoint. 5) Conduct internal audits to identify any instances of Stirling-PDF in use, including shadow IT deployments, to ensure all are updated or isolated. 6) Monitor logs for unusual outbound requests or access patterns indicative of SSRF exploitation attempts. 7) Consider network segmentation to isolate document processing servers from sensitive internal resources. 8) Educate development and IT teams about SSRF risks and secure coding practices to prevent similar vulnerabilities in custom integrations.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-08-07T18:27:23.305Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 689a6886ad5a09ad002967bd
Added to database: 8/11/2025, 10:02:46 PM
Last enriched: 8/19/2025, 1:44:30 AM
Last updated: 8/19/2025, 11:38:06 PM
Views: 15
Related Threats
CVE-2025-9233: Cross Site Scripting in Scada-LTS
MediumCVE-2025-55751: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in HackUCF OnboardLite
MediumCVE-2025-50864: n/a
HighCVE-2025-51991: n/a
HighCVE-2025-51990: n/a
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.