CVE-2026-27625

Stirling-PDF is a locally hosted web application that performs various operations on PDF files. In versions prior to 2.5.2, the /api/v1/convert/markdown/pdf endpoint extracts user-supplied ZIP entries without path checks. Any authenticated user can write files outside the intended temporary working directory, leading to arbitrary file write with the privileges of the Stirling-PDF process user (stirlingpdfuser). This can overwrite writable files and compromise data integrity, with further impact depending on writable paths. The issue was fixed in version 2.5.2.
Configurations

Configuration 1 (hide)

cpe:2.3:a:stirling:stirling_pdf:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-20 09:16

Updated : 2026-03-24 16:03


NVD link : CVE-2026-27625

Mitre link : CVE-2026-27625

CVE.ORG link : CVE-2026-27625


JSON object : View

Products Affected

stirling

  • stirling_pdf
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-23

Relative Path Traversal