Vulnerability Description
A Server-Side Request Forgery (SSRF) in JGM Pandoc v3.6.4 allows attackers to gain access to and compromise the whole infrastructure via injecting a crafted iframe. Note: Some users have stated that Pandoc by default can retrieve and parse untrusted HTML content which can enable SSRF vulnerabilities. Using the ‘--sandbox’ option or ‘pandoc-server’ can mitigate such vulnerabilities. Using pandoc with an external ‘--pdf-engine’ can also enable SSRF vulnerabilities, such as CVE-2022-35583 in wkhtmltopdf.
CVSS Score
LOW
Related Weaknesses (CWE)
References
- http://jgm.com
- http://pandoc.com
- https://github.com/RealestName/Vulnerability-Research/tree/main/CVE-2025-51591
- https://github.com/jgm/pandoc/discussions/11200
- https://github.com/jgm/pandoc/issues/10682
- https://github.com/jgm/pandoc/issues/11261
- https://github.com/jgm/pandoc/issues/8874
- https://github.com/jgm/pandoc/pull/11262
- https://www.wiz.io/blog/imds-anomaly-hunting-zero-day
- https://github.com/jgm/pandoc/commit/67edf7ce7cd3563a180ae44bd122b012e22364f8
- https://github.com/jgm/pandoc/issues/10682
- https://pandoc.org
- https://www.wiz.io/blog/imds-anomaly-hunting-zero-day
- not-applicable:http://jgm.com/
- not-applicable:http://pandoc.com/
FAQ
What is CVE-2025-51591?
CVE-2025-51591 is a vulnerability with a CVSS score of 3.7 (LOW). A Server-Side Request Forgery (SSRF) in JGM Pandoc v3.6.4 allows attackers to gain access to and compromise the whole infrastructure via injecting a crafted iframe. Note: Some users have stated that P...
How severe is CVE-2025-51591?
CVE-2025-51591 has been rated LOW with a CVSS base score of 3.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-51591?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.