CVE-2025-51591Server-Side Request Forgery in Pandoc

Severity
3.7LOWNVD
OSV9.8VulnCheck9.8
EPSS
0.1%
top 72.36%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 11
Latest updateSep 22

Description

A Server-Side Request Forgery (SSRF) in JGM Pandoc v3.6.4 allows attackers to gain access to and compromise the whole infrastructure via injecting a crafted iframe. Note: Some users have stated that Pandoc by default can retrieve and parse untrusted HTML content which can enable SSRF vulnerabilities. Using the ‘--sandbox’ option or ‘pandoc-server’ can mitigate such vulnerabilities. Using pandoc with an external ‘--pdf-engine’ can also enable SSRF vulnerabilities, such as CVE-2022-35583 in wkhtml

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 2.2 | Impact: 1.4

Affected Packages1 packages

debiandebian/pandoc

🔴Vulnerability Details

3
GHSA
GHSA-mcv3-ch54-xqfh: A Server-Side Request Forgery (SSRF) in JGM Pandoc v32025-07-11
OSV
CVE-2025-51591: A Server-Side Request Forgery (SSRF) in JGM Pandoc v32025-07-11
VulnCheck
Server-Side Request Forgery (SSRF)2025

📋Vendor Advisories

2
Red Hat
pandoc: Server-Side Request Forgery in Pandoc2025-07-11
Debian
CVE-2025-51591: pandoc - A Server-Side Request Forgery (SSRF) in JGM Pandoc v3.6.4 allows attackers to ga...2025

🕵️Threat Intelligence

1
Wiz
IMDS Abused: Hunting Rare Behaviors to Uncover Exploits | Wiz Blog2025-09-22