Executive Summary

Informations
Name CVE-2025-1022 First vendor Publication 2025-02-05
Vendor Cve Last vendor Modification 2025-02-05

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

Versions of the package spatie/browsershot before 5.0.5 are vulnerable to Improper Input Validation in the setHtml function, invoked by Browsershot::html(), which can be bypassed by omitting the slashes in the file URI (e.g., file:../../../../etc/passwd). This is due to missing validations of the user input that should be blocking file URI schemes (e.g., file:// and file:/) in the HTML content.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1022

Sources (Detail)

https://gist.github.com/mrdgef/a820837c530e09e1dd725e013e0d4341
https://github.com/spatie/browsershot/commit/bcfd608b264fab654bf78e199bdfbb03...
https://github.com/spatie/browsershot/commit/e3273974506865a24fbb5b65b534d8d4...
https://security.snyk.io/vuln/SNYK-PHP-SPATIEBROWSERSHOT-8496747
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
Date Informations
2025-02-06 03:07:45
  • Multiple Updates
2025-02-06 03:07:40
  • Multiple Updates
2025-02-06 00:20:28
  • Multiple Updates
2025-02-05 09:20:28
  • First insertion