Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-jv7x-xhv2-p5v2 | LaRecipe is vulnerable to Server-Side Template Injection attacks |
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 15 Jul 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
Mon, 14 Jul 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LaRecipe is an application that allows users to create documentation with Markdown inside a Laravel app. Versions prior to 2.8.1 are vulnerable to Server-Side Template Injection (SSTI), which could potentially lead to Remote Code Execution (RCE) in vulnerable configurations. Attackers could execute arbitrary commands on the server, access sensitive environment variables, and/or escalate access depending on server configuration. Users are strongly advised to upgrade to version v2.8.1 or later to receive a patch. | |
| Title | LaRecipe is vulnerable to Server-Side Template Injection attacks | |
| Weaknesses | CWE-1336 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-07-15T19:49:32.713Z
Reserved: 2025-07-09T14:14:52.531Z
Link: CVE-2025-53833
Updated: 2025-07-15T13:25:47.267Z
Status : Deferred
Published: 2025-07-14T23:15:24.710
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-53833
No data.
OpenCVE Enrichment
No data.
Github GHSA