Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 20 Mar 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Stirlingpdf
Stirlingpdf stirling Pdf |
|
| Vendors & Products |
Stirlingpdf
Stirlingpdf stirling Pdf |
Fri, 20 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Mar 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Stirling-PDF is a locally hosted web application that performs various operations on PDF files. In versions prior to 2.5.2, the /api/v1/convert/markdown/pdf endpoint extracts user-supplied ZIP entries without path checks. Any authenticated user can write files outside the intended temporary working directory, leading to arbitrary file write with the privileges of the Stirling-PDF process user (stirlingpdfuser). This can overwrite writable files and compromise data integrity, with further impact depending on writable paths. The issue was fixed in version 2.5.2. | |
| Title | Stirling-PDF Zip Slip: Arbitrary File Write via Path Traversal in Markdown-to-PDF ZIP Extraction | |
| Weaknesses | CWE-22 CWE-23 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-20T15:37:16.038Z
Reserved: 2026-02-20T22:02:30.027Z
Link: CVE-2026-27625
Updated: 2026-03-20T15:37:11.873Z
Status : Awaiting Analysis
Published: 2026-03-20T09:16:13.857
Modified: 2026-03-20T13:37:50.737
Link: CVE-2026-27625
No data.
OpenCVE Enrichment
Updated: 2026-03-20T16:30:40Z