Overview
The CVE-2025-55161 vulnerability is a critical security flaw that has been identified in the Stirling-PDF web application. This vulnerability specifically affects the /api/v1/convert/markdown/pdf endpoint of the Stirling-PDF application which is used to convert Markdown to PDF files. The vulnerability has the potential to be heavily exploited, leading to system compromise or potential data leakage. Given the severity of the issue, it is crucial for system administrators and developers who are using the application to understand the nature of this vulnerability, how it can be exploited, and the necessary steps to mitigate its potential impact.
Vulnerability Summary
CVE ID: CVE-2025-55161
Severity: Critical (CVSS 8.6)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: System compromise or data leakage
Affected Products
Escape the Surveillance Era
Most apps won’t tell you the truth.
They’re part of the problem.
Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.
Ameeba Chat gives you a way out.
- • No phone number
- • No email
- • No personal info
- • Anonymous aliases
- • End-to-end encrypted
Chat without a trace.
Product | Affected Versions
Stirling-PDF | Prior to version 1.1.0
How the Exploit Works
The vulnerability exists because of an improper sanitization mechanism while converting Markdown to PDF. The Stirling-PDF application uses a third-party tool to process this conversion and includes a sanitizer for security sanitization. However, this sanitization can be bypassed, leading to a Server-Side Request Forgery (SSRF) vulnerability. An attacker can exploit this vulnerability to cause the server to send HTTP requests to an arbitrary destination, possibly leading to system compromise or data leakage.
Conceptual Example Code
POST /api/v1/convert/markdown/pdf HTTP/1.1
Host: vulnerable-host.example.com
Content-Type: application/json
{ "markdown": "" }
In the above example, an attacker uses the Markdown image syntax to craft a malicious payload. The Stirling-PDF server will fetch the image from the URL, thereby sending a request to the attacker’s server.
Mitigation Guidance
Users are advised to immediately upgrade to version 1.1.0 of the Stirling-PDF application which contains a patch for this vulnerability. If upgrading is not immediately possible, the use of a Web Application Firewall (WAF) or Intrusion Detection System (IDS) can provide temporary mitigation by blocking or alerting on suspicious requests to the /api/v1/convert/markdown/pdf endpoint. However, these temporary measures are not a substitute for patching the application.