CVE-2025-55853

9.1 CRITICAL

📋 TL;DR

SoftVision webPDF versions before 10.0.2 contain a Server-Side Request Forgery (SSRF) vulnerability in the PDF converter function. Attackers can upload XML or HTML files that trigger requests to internal systems or local files when converted to PDF, enabling internal port scanning and Local File Inclusion. This affects all users running vulnerable versions of webPDF.

💻 Affected Systems

Products:
  • SoftVision webPDF
Versions: All versions before 10.0.2
Operating Systems: All supported OS platforms
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the PDF converter function which processes uploaded files. Any installation with file upload capabilities enabled is vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of internal network services through SSRF to internal endpoints, sensitive file exfiltration via LFI, and potential lateral movement within the network.

🟠

Likely Case

Internal port scanning to discover vulnerable services, exfiltration of configuration files or sensitive data from the server via LFI, and potential access to internal HTTP services.

🟢

If Mitigated

Limited to scanning of non-sensitive internal services if proper network segmentation and file access controls are implemented.

🌐 Internet-Facing: HIGH - The vulnerability can be exploited remotely via file upload, allowing attackers to pivot from internet-facing systems to internal network resources.
🏢 Internal Only: HIGH - Even internally, the vulnerability allows attackers to scan internal services and access files on the server, potentially leading to lateral movement.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept code is available on GitHub. Exploitation requires only file upload capability, which is typically available to unauthenticated users in web applications.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.0.2

Vendor Advisory: https://www.webpdf.de/

Restart Required: Yes

Instructions:

1. Download webPDF version 10.0.2 or later from the official vendor website. 2. Backup current configuration and data. 3. Stop the webPDF service. 4. Install the updated version following vendor instructions. 5. Restart the service and verify functionality.

🔧 Temporary Workarounds

Disable file upload functionality

all

Temporarily disable the PDF converter file upload feature until patching can be completed.

# Configuration changes depend on specific deployment. Consult webPDF documentation for disabling upload features.

Implement input validation

all

Add server-side validation to reject XML/HTML files containing http://, file://, or other dangerous protocols in resource references.

# Implement custom validation in webPDF configuration or application layer to sanitize uploaded file content

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate webPDF server from sensitive internal systems
  • Deploy web application firewall (WAF) rules to block malicious file uploads containing SSRF payloads

🔍 How to Verify

Check if Vulnerable:

Check webPDF version via admin interface or configuration files. If version is below 10.0.2, the system is vulnerable.

Check Version:

# Check version in webPDF admin interface or configuration files. Exact command depends on installation method.

Verify Fix Applied:

After updating to 10.0.2 or later, test file upload functionality with SSRF payloads to confirm they are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads with XML/HTML extensions
  • Outbound HTTP requests from webPDF server to internal IPs
  • File access attempts to sensitive system paths

Network Indicators:

  • HTTP requests from webPDF server to internal services on non-standard ports
  • Multiple rapid connection attempts to different internal ports

SIEM Query:

source="webpdf" AND (file_upload="*.xml" OR file_upload="*.html") AND (url="http://internal*" OR url="file://*")

🔗 References

📤 Share & Export