Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Stirling-Tools | Stirling-PDF | < 1.1.0 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Stirling-PDF is a locally hosted web application that performs various operations on PDF files. Prior to version 1.1.0, when using the /api/v1/convert/markdown/pdf endpoint to convert Markdown to PDF, the backend calls a third-party tool to process it and includes a sanitizer for security sanitization which can be bypassed and result in SSRF. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-55161.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2025-55151 | 8.6 HIGH | Stirling-PDF SSRF vulnerability on /api/v1/convert/file/pdf |
| CVE-2025-55150 | 8.6 HIGH | Stirling-PDF SSRF vulnerability on /api/v1/convert/html/pdf |
No comments yet