Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-11849

CVSS 9.3 · Critical EPSS 0.23% · P46
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-11849

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Versions of the package mammoth from 0.3.25 and before 1.11.0; versions of the package mammoth from 0.3.25 and before 1.11.0; versions of the package mammoth before 1.11.0; versions of the package org.zwobble.mammoth:mammoth before 1.11.0 are vulnerable to Directory Traversal due to the lack of path or file type validation when processing a docx file containing an image with an external link (r:link attribute instead of embedded r:embed). The library resolves the URI to a file path and after reading, the content is encoded as base64 and included in the HTML output as a data URI. An attacker can read arbitrary files on the system where the conversion is performed or cause an excessive resources consumption by crafting a docx file that links to special device files such as /dev/random or /dev/zero.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Mammoth 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Mammoth是Michael Williamson个人开发者的一个将Word文档转换为HTML的工具。 mammoth 0.3.25版本和1.11.0之前版本存在安全漏洞,该漏洞源于处理docx文件时缺少路径或文件类型验证,可能导致目录遍历攻击或资源过度消耗。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-mammoth 0.3.25 ~ 1.11.0 -
-mammoth 0.3.25 ~ 1.11.0 -
-Mammoth 0 ~ 1.11.0 -
-org.zwobble.mammoth:mammoth 0 ~ 1.11.0 -

II. Public POCs for CVE-2025-11849

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-11849

登录查看更多情报信息。

Same Patch Batch · n/a · 2025-10-17 · 12 CVEs total

CVE-2025-60359Radare2 安全漏洞
CVE-2025-60360Radare2 安全漏洞
CVE-2025-60279ILLA Builder 安全漏洞
CVE-2025-60361radare2 安全漏洞
CVE-2025-57567PluXml 安全漏洞
CVE-2025-60514tillywork 安全漏洞
CVE-2025-56320Cobblestone Enterprise Contract Management Software 安全漏洞
CVE-2025-56218SigningHub 安全漏洞
CVE-2025-56221SigningHub 安全漏洞
CVE-2025-56316MingSoft MCMS 安全漏洞
CVE-2025-57164Flowise 安全漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2025-11849

No comments yet


Leave a comment