Untriaged
Permalink
CVE-2026-27625
8.1 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
Stirling-PDF Zip Slip: Arbitrary File Write via Path Traversal in Markdown-to-PDF ZIP Extraction
Stirling-PDF is a locally hosted web application that performs various operations on PDF files. In versions prior to 2.5.2, the /api/v1/convert/markdown/pdf endpoint extracts user-supplied ZIP entries without path checks. Any authenticated user can write files outside the intended temporary working directory, leading to arbitrary file write with the privileges of the Stirling-PDF process user (stirlingpdfuser). This can overwrite writable files and compromise data integrity, with further impact depending on writable paths. The issue was fixed in version 2.5.2.
References
- https://github.com/Stirling-Tools/Stirling-PDF/security/advisories/GHSA-wccq-mg6x-2w22 x_refsource_CONFIRM
- https://github.com/Stirling-Tools/Stirling-PDF/releases/tag/v2.5.2 x_refsource_MISC
Affected products
Stirling-PDF
- ==< 2.5.2
Matching in nixpkgs
pkgs.stirling-pdf
Locally hosted web application that allows you to perform various operations on PDF files
pkgs.stirling-pdf-desktop
Powerful, open-source PDF editing platform runnable as a desktop app
Package maintainers
-
@TomaSajt TomaSajt