SoftVision webPDF before 10.0.2 is vulnerable to Server-Side Request Forgery (SSRF). The PDF converter function does not check if internal or external resources are requested in the uploaded files and allows for protocols such as http:// and file:///. This allows an attacker to upload an XML or HTML file in the application, which when rendered to a PDF allows for internal port scanning and Local File Inclusion (LFI).

Project Subscriptions

Vendors Products
Softvision Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 20 Feb 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Softvision
Softvision webpdf
Vendors & Products Softvision
Softvision webpdf

Thu, 19 Feb 2026 14:45:00 +0000

Type Values Removed Values Added
Description SoftVision webPDF before 10.0.2 is vulnerable to Server-Side Request Forgery (SSRF). The PDF converter function does not check if internal or external resources are requested in the uploaded files and allows for protocols such as http:// and file:///. This allows an attacker to upload an XML or HTML file in the application, which when rendered to a PDF allows for internal port scanning and Local File Inclusion (LFI).
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-02-19T14:18:15.816Z

Reserved: 2025-08-16T00:00:00.000Z

Link: CVE-2025-55853

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-19T15:16:11.190

Modified: 2026-02-19T15:52:39.260

Link: CVE-2025-55853

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-20T10:11:35Z

Weaknesses

No weakness.