Versions of the package spatie/browsershot before 5.0.5 are vulnerable to Improper Input Validation in the setHtml function, invoked by Browsershot::html(), which can be bypassed by omitting the slashes in the file URI (e.g., file:../../../../etc/passwd). This is due to missing validations of the user input that should be blocking file URI schemes (e.g., file:// and file:/) in the HTML content.
Metrics
Affected Vendors & Products
References
History
Wed, 05 Feb 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 05 Feb 2025 05:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Versions of the package spatie/browsershot before 5.0.5 are vulnerable to Improper Input Validation in the setHtml function, invoked by Browsershot::html(), which can be bypassed by omitting the slashes in the file URI (e.g., file:../../../../etc/passwd). This is due to missing validations of the user input that should be blocking file URI schemes (e.g., file:// and file:/) in the HTML content. | |
Weaknesses | CWE-20 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2025-02-05T19:29:38.459Z
Reserved: 2025-02-04T10:20:48.623Z
Link: CVE-2025-1022

Updated: 2025-02-05T19:29:26.599Z

Status : Received
Published: 2025-02-05T05:15:10.337
Modified: 2025-02-05T20:15:45.470
Link: CVE-2025-1022

No data.