๐Ÿ” CVE Alert

CVE-2026-27625

HIGH 8.1

Stirling-PDF Zip Slip: Arbitrary File Write via Path Traversal in Markdown-to-PDF ZIP Extraction

CVSS Score
8.1
EPSS Score
0.1%
EPSS Percentile
17th

Stirling-PDF is a locally hosted web application that performs various operations on PDF files. In versions prior to 2.5.2, the /api/v1/convert/markdown/pdf endpoint extracts user-supplied ZIP entries without path checks. Any authenticated user can write files outside the intended temporary working directory, leading to arbitrary file write with the privileges of the Stirling-PDF process user (stirlingpdfuser). This can overwrite writable files and compromise data integrity, with further impact depending on writable paths. The issue was fixed in version 2.5.2.

CWE CWE-22 CWE-23
Vendor stirling-tools
Product stirling-pdf
Published Mar 20, 2026
Last Updated Mar 20, 2026
Stay Ahead of the Next One

Get instant alerts for stirling-tools stirling-pdf

Be the first to know when new high vulnerabilities affecting stirling-tools stirling-pdf are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
High

Affected Versions

Stirling-Tools / Stirling-PDF
< 2.5.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/Stirling-Tools/Stirling-PDF/security/advisories/GHSA-wccq-mg6x-2w22 github.com: https://github.com/Stirling-Tools/Stirling-PDF/releases/tag/v2.5.2