Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 24 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Stirling
Stirling stirling Pdf |
|
| CPEs | cpe:2.3:a:stirling:stirling_pdf:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Stirling
Stirling stirling Pdf |
Fri, 20 Mar 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Stirlingpdf
Stirlingpdf stirling Pdf |
|
| Vendors & Products |
Stirlingpdf
Stirlingpdf stirling Pdf |
Fri, 20 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Mar 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Stirling-PDF is a locally hosted web application that performs various operations on PDF files. In versions prior to 2.5.2, the /api/v1/convert/markdown/pdf endpoint extracts user-supplied ZIP entries without path checks. Any authenticated user can write files outside the intended temporary working directory, leading to arbitrary file write with the privileges of the Stirling-PDF process user (stirlingpdfuser). This can overwrite writable files and compromise data integrity, with further impact depending on writable paths. The issue was fixed in version 2.5.2. | |
| Title | Stirling-PDF Zip Slip: Arbitrary File Write via Path Traversal in Markdown-to-PDF ZIP Extraction | |
| Weaknesses | CWE-22 CWE-23 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-20T15:37:16.038Z
Reserved: 2026-02-20T22:02:30.027Z
Link: CVE-2026-27625
Updated: 2026-03-20T15:37:11.873Z
Status : Analyzed
Published: 2026-03-20T09:16:13.857
Modified: 2026-03-24T16:03:23.303
Link: CVE-2026-27625
No data.
OpenCVE Enrichment
Updated: 2026-03-25T14:29:47Z