Description
Versions of the package mammoth from 0.3.25 and before 1.11.0; versions of the package mammoth from 0.3.25 and before 1.11.0; versions of the package mammoth before 1.11.0; versions of the package org.zwobble.mammoth:mammoth before 1.11.0 are vulnerable to Directory Traversal due to the lack of path or file type validation when processing a docx file containing an image with an external link (r:link attribute instead of embedded r:embed). The library resolves the URI to a file path and after reading, the content is encoded as base64 and included in the HTML output as a data URI. An attacker can read arbitrary files on the system where the conversion is performed or cause an excessive resources consumption by crafting a docx file that links to special device files such as /dev/random or /dev/zero.
INFO
Published Date :
2025-10-17T05:00:06.278Z
Last Modified :
2025-10-17T14:24:39.437Z
Source :
snyk
AFFECTED PRODUCTS
The following products are affected by CVE-2025-11849 vulnerability.
| Vendors | Products |
|---|---|
| Mammoth |
|
| Python |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-11849.