Description

Stirling-PDF is a locally hosted web application that performs various operations on PDF files. Prior to version 1.1.0, when using the /api/v1/convert/markdown/pdf endpoint to convert Markdown to PDF, the backend calls a third-party tool to process it and includes a sanitizer for security sanitization which can be bypassed and result in SSRF. This issue has been patched in version 1.1.0.

INFO

Published Date :

2025-08-11T22:28:30.152Z

Last Modified :

2025-08-12T15:50:45.183Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2025-55161 vulnerability.

Vendors Products
Stirlingpdf
  • Stirling Pdf
REFERENCES

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact