Impact
The vulnerability lies in the /api/v1/convert/eml/pdf endpoint when downloadHtml=true, as Stirling-PDF returns unsanitized HTML from an email body. An attacker who can send a crafted email to a user can have that user execute arbitrary scripts in their browser upon exporting the email to HTML.
Affected Systems
Stirling-Tools’ Stirling-PDF version 2.7.3 is affected. The issue is fixed in version 2.8.0. No other products or versions are listed as affected.
Risk and Exploitability
The CVSS score of 5.4 indicates moderate risk, while an EPSS score below 1% suggests a low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. The attack likely requires an attacker to deliver a malicious email to a user who subsequently uses the Export HTML feature, so it is a location–adversary combination that is primarily local to the user’s environment. Known remediation is to upgrade to the fixed version, which removes the ability to export unsanitized HTML.
OpenCVE Enrichment