CVE-2025-55150

8.6 HIGH

📋 TL;DR

CVE-2025-55150 is a Server-Side Request Forgery (SSRF) vulnerability in Stirling-PDF's HTML-to-PDF conversion endpoint. Attackers can bypass security sanitization to make unauthorized requests to internal systems. This affects all Stirling-PDF instances prior to version 1.1.0 that have the vulnerable endpoint exposed.

💻 Affected Systems

Products:
  • Stirling-PDF
Versions: All versions prior to 1.1.0
Operating Systems: All platforms running Stirling-PDF
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects instances with the /api/v1/convert/html/pdf endpoint accessible. Docker deployments and self-hosted installations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full internal network compromise allowing attackers to access sensitive internal services, exfiltrate data, or pivot to other systems.

🟠

Likely Case

Information disclosure from internal services, potential data exfiltration, and reconnaissance of internal network infrastructure.

🟢

If Mitigated

Limited impact with proper network segmentation and egress filtering, potentially only revealing internal service banners.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SSRF vulnerabilities are commonly exploited. The advisory suggests the bypass is straightforward once discovered.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.1.0

Vendor Advisory: https://github.com/Stirling-Tools/Stirling-PDF/security/advisories/GHSA-xw8v-9mfm-g2pm

Restart Required: Yes

Instructions:

1. Stop Stirling-PDF service. 2. Update to version 1.1.0 or later. 3. Restart the service. For Docker: docker pull frooodle/s-pdf:latest && docker-compose up -d

🔧 Temporary Workarounds

Disable HTML-to-PDF endpoint

all

Temporarily disable the vulnerable /api/v1/convert/html/pdf endpoint

Modify configuration to remove or restrict access to the endpoint

Network segmentation

all

Isolate Stirling-PDF from sensitive internal networks

Configure firewall rules to restrict outbound connections from Stirling-PDF

🧯 If You Can't Patch

  • Implement strict network egress filtering to limit outbound connections from Stirling-PDF
  • Deploy a WAF with SSRF protection rules in front of Stirling-PDF

🔍 How to Verify

Check if Vulnerable:

Check if Stirling-PDF version is below 1.1.0 and the /api/v1/convert/html/pdf endpoint is accessible

Check Version:

Check application logs or UI for version information, or inspect docker image tag

Verify Fix Applied:

Confirm version is 1.1.0 or later and test SSRF attempts are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound connections from Stirling-PDF process
  • Multiple requests to /api/v1/convert/html/pdf with suspicious parameters

Network Indicators:

  • Outbound connections from Stirling-PDF to internal IP ranges
  • HTTP requests to internal services from Stirling-PDF

SIEM Query:

source="stirling-pdf" AND (url_path="/api/v1/convert/html/pdf" OR dest_ip=private_ip_range)

🔗 References

📤 Share & Export