Stirling-PDF is a locally hosted web application that performs various operations on PDF files. In versions prior to 2.5.2, the /api/v1/convert/markdown/pdf endpoint extracts user-supplied ZIP entries without path checks. Any authenticated user can write files outside the intended temporary working directory, leading to arbitrary file write with the privileges of the Stirling-PDF process user (stirlingpdfuser). This can overwrite writable files and compromise data integrity, with further impact depending on writable paths. The issue was fixed in version 2.5.2.
References
| Link | Resource |
|---|---|
| https://github.com/Stirling-Tools/Stirling-PDF/releases/tag/v2.5.2 | Patch Product |
| https://github.com/Stirling-Tools/Stirling-PDF/security/advisories/GHSA-wccq-mg6x-2w22 | Exploit Vendor Advisory |
Configurations
History
24 Mar 2026, 16:03
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:stirling:stirling_pdf:*:*:*:*:*:*:*:* | |
| References | () https://github.com/Stirling-Tools/Stirling-PDF/releases/tag/v2.5.2 - Patch, Product | |
| References | () https://github.com/Stirling-Tools/Stirling-PDF/security/advisories/GHSA-wccq-mg6x-2w22 - Exploit, Vendor Advisory | |
| First Time |
Stirling stirling Pdf
Stirling |
|
| Summary |
|
20 Mar 2026, 09:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-20 09:16
Updated : 2026-03-24 16:03
NVD link : CVE-2026-27625
Mitre link : CVE-2026-27625
CVE.ORG link : CVE-2026-27625
JSON object : View
Products Affected
stirling
- stirling_pdf
