Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-51591

Опубликовано: 11 июл. 2025
Источник: debian
EPSS Низкий

Описание

A Server-Side Request Forgery (SSRF) in JGM Pandoc v3.6.4 allows attackers to gain access to and compromise the whole infrastructure via injecting a crafted iframe. Note: Some users have stated that Pandoc by default can retrieve and parse untrusted HTML content which can enable SSRF vulnerabilities. Using the ‘--sandbox’ option or ‘pandoc-server’ can mitigate such vulnerabilities. Using pandoc with an external ‘--pdf-engine’ can also enable SSRF vulnerabilities, such as CVE-2022-35583 in wkhtmltopdf.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pandocunfixedpackage

Примечания

  • https://github.com/jgm/pandoc/issues/10682

  • https://github.com/jgm/pandoc/commit/67edf7ce7cd3563a180ae44bd122b012e22364f8

  • Fix simply updates the documentation

EPSS

Процентиль: 11%
0.00038
Низкий

Связанные уязвимости

CVSS3: 3.7
ubuntu
5 месяцев назад

A Server-Side Request Forgery (SSRF) in JGM Pandoc v3.6.4 allows attackers to gain access to and compromise the whole infrastructure via injecting a crafted iframe. Note: Some users have stated that Pandoc by default can retrieve and parse untrusted HTML content which can enable SSRF vulnerabilities. Using the ‘--sandbox’ option or ‘pandoc-server’ can mitigate such vulnerabilities. Using pandoc with an external ‘--pdf-engine’ can also enable SSRF vulnerabilities, such as CVE-2022-35583 in wkhtmltopdf.

CVSS3: 4.8
redhat
5 месяцев назад

A Server-Side Request Forgery (SSRF) in JGM Pandoc v3.6.4 allows attackers to gain access to and compromise the whole infrastructure via injecting a crafted iframe.

CVSS3: 3.7
nvd
5 месяцев назад

A Server-Side Request Forgery (SSRF) in JGM Pandoc v3.6.4 allows attackers to gain access to and compromise the whole infrastructure via injecting a crafted iframe. Note: Some users have stated that Pandoc by default can retrieve and parse untrusted HTML content which can enable SSRF vulnerabilities. Using the ‘--sandbox’ option or ‘pandoc-server’ can mitigate such vulnerabilities. Using pandoc with an external ‘--pdf-engine’ can also enable SSRF vulnerabilities, such as CVE-2022-35583 in wkhtmltopdf.

CVSS3: 6.5
github
5 месяцев назад

A Server-Side Request Forgery (SSRF) in JGM Pandoc v3.6.4 allows attackers to gain access to and compromise the whole infrastructure via injecting a crafted iframe.

CVSS3: 6.5
fstec
3 месяца назад

Уязвимость библиотеки преобразования форматов разметки Pandoc языка программирования Haskell, связанная c подделкой запросов на стороне сервера, позволяющая нарушителю раскрыть защищаемую информацию

EPSS

Процентиль: 11%
0.00038
Низкий