CVE-2025-51591

low

Description

A Server-Side Request Forgery (SSRF) in JGM Pandoc v3.6.4 allows attackers to gain access to and compromise the whole infrastructure via injecting a crafted iframe. Note: Some users have stated that Pandoc by default can retrieve and parse untrusted HTML content which can enable SSRF vulnerabilities. Using the ‘--sandbox’ option or ‘pandoc-server’ can mitigate such vulnerabilities. Using pandoc with an external ‘--pdf-engine’ can also enable SSRF vulnerabilities, such as CVE-2022-35583 in wkhtmltopdf.

References

https://thehackernews.com/2025/09/hackers-exploit-pandoc-cve-2025-51591.html

https://www.wiz.io/blog/imds-anomaly-hunting-zero-day

https://pandoc.org

https://github.com/jgm/pandoc/pull/11262

https://github.com/jgm/pandoc/issues/8874

https://github.com/jgm/pandoc/issues/11261

https://github.com/jgm/pandoc/issues/10682

https://github.com/jgm/pandoc/discussions/11200

https://github.com/jgm/pandoc/commit/67edf7ce7cd3563a180ae44bd122b012e22364f8

https://github.com/RealestName/Vulnerability-Research/tree/main/CVE-2025-51591

http://pandoc.com

http://jgm.com

Details

Source: Mitre, NVD

Published: 2025-07-11

Updated: 2025-11-24

Risk Information

CVSS v2

Base Score: 6.1

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 3.7

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

Severity: Low

EPSS

EPSS: 0.00028