Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-55161 PoC — Stirling-PDF 代码问题漏洞

Source
Associated Vulnerability
Title:Stirling-PDF 代码问题漏洞 (CVE-2025-55161)
Description:Stirling-PDF是Stirling Tools开源的一个使用 Docker 的强大、本地托管的基于 Web 的 PDF 操作工具。 Stirling-PDF 1.1.0之前版本存在代码问题漏洞,该漏洞源于Markdown转PDF功能中的清理器可被绕过,可能导致服务端请求伪造。
Description
Stirling-PDF is a locally hosted web application that performs various operations on PDF files. Prior to version 1.1.0, when using the /api/v1/convert/markdown/pdf endpoint to convert Markdown to PDF, the backend calls a third-party tool to process it and includes a sanitizer for security sanitization which can be bypassed and result in SSRF.
File Snapshot

id: CVE-2025-55161 info: name: Stirling-PDF SSRF via Markdown author: beginee severity: high ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.