Skip to main content

CVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF

High
VulnerabilityCVE-2025-55151cvecve-2025-55151cwe-918
Published: Mon Aug 11 2025 (08/11/2025, 21:56:54 UTC)
Source: CVE Database V5
Vendor/Project: Stirling-Tools
Product: Stirling-PDF

Description

Stirling-PDF is a locally hosted web application that performs various operations on PDF files. Prior to version 1.1.0, the "convert file to pdf" functionality (/api/v1/convert/file/pdf) uses LibreOffice's unoconvert tool for conversion, and SSRF vulnerabilities exist during the conversion process. This issue has been patched in version 1.1.0.

AI-Powered Analysis

AILast updated: 08/19/2025, 01:44:30 UTC

Technical Analysis

CVE-2025-55151 is a high-severity Server-Side Request Forgery (SSRF) vulnerability identified in Stirling-Tools' Stirling-PDF application, specifically affecting versions prior to 1.1.0. Stirling-PDF is a locally hosted web application designed to perform various PDF file operations, including converting files to PDF format. The vulnerable functionality resides in the endpoint /api/v1/convert/file/pdf, which leverages LibreOffice's unoconvert tool for file conversion. During this conversion process, the application fails to properly validate or sanitize user-supplied input, allowing an attacker to craft malicious requests that cause the server to initiate unintended network requests to internal or external resources. SSRF vulnerabilities like CWE-918 enable attackers to bypass network access controls, potentially accessing sensitive internal services, metadata endpoints, or other protected resources that are not directly exposed to the internet. The CVSS v3.1 score of 8.6 reflects the high impact of this vulnerability, with an attack vector of network (AV:N), no privileges required (PR:N), and no user interaction needed (UI:N). The impact on confidentiality is high, as attackers can retrieve sensitive data from internal systems. Integrity impact is low, and availability impact is low but present. The vulnerability was patched in version 1.1.0 of Stirling-PDF, indicating that upgrading to this or later versions mitigates the risk. No known exploits are currently reported in the wild, but the ease of exploitation and potential impact warrant immediate attention.

Potential Impact

For European organizations, the SSRF vulnerability in Stirling-PDF poses significant risks, especially for entities relying on this tool for document processing within internal networks. Exploitation could allow attackers to access internal services, including databases, administrative interfaces, or cloud metadata services, potentially leading to data breaches or lateral movement within the network. Confidentiality of sensitive documents and internal infrastructure information is at risk. Given the vulnerability requires no authentication or user interaction, attackers can remotely exploit exposed instances, increasing the threat surface. Organizations in sectors such as finance, healthcare, government, and critical infrastructure, which often handle sensitive documents and may deploy such tools internally, face heightened risk. Additionally, the use of LibreOffice's unoconvert tool as part of the conversion process means that any misconfiguration or exposure of Stirling-PDF to untrusted networks could exacerbate the impact. The lack of known exploits in the wild provides a window for proactive mitigation, but the high CVSS score and ease of exploitation necessitate urgent patching and network controls.

Mitigation Recommendations

European organizations should implement the following specific mitigation measures: 1) Immediately upgrade Stirling-PDF installations to version 1.1.0 or later, where the SSRF vulnerability has been patched. 2) Restrict network access to the Stirling-PDF service, ensuring it is not exposed to untrusted networks or the public internet. 3) Implement strict egress filtering on servers running Stirling-PDF to prevent unauthorized outbound requests, limiting the ability of SSRF attacks to reach internal or external targets. 4) Employ application-layer firewall rules or web application firewalls (WAFs) to detect and block suspicious request patterns targeting the /api/v1/convert/file/pdf endpoint. 5) Conduct internal audits to identify any instances of Stirling-PDF in use, including shadow IT deployments, to ensure all are updated or isolated. 6) Monitor logs for unusual outbound requests or access patterns indicative of SSRF exploitation attempts. 7) Consider network segmentation to isolate document processing servers from sensitive internal resources. 8) Educate development and IT teams about SSRF risks and secure coding practices to prevent similar vulnerabilities in custom integrations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-08-07T18:27:23.305Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689a6886ad5a09ad002967bd

Added to database: 8/11/2025, 10:02:46 PM

Last enriched: 8/19/2025, 1:44:30 AM

Last updated: 8/19/2025, 11:38:06 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats