Versions of the package spatie/browsershot before 5.0.5 are vulnerable to Improper Input Validation in the setHtml function, invoked by Browsershot::html(), which can be bypassed by omitting the slashes in the file URI (e.g., file:../../../../etc/passwd). This is due to missing validations of the user input that should be blocking file URI schemes (e.g., file:// and file:/) in the HTML content.
                
            Metrics
Affected Vendors & Products
References
        History
                    Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        
        epss
         
  | 
    
        
        
        epss
         
  | 
Wed, 05 Feb 2025 20:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Wed, 05 Feb 2025 05:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Versions of the package spatie/browsershot before 5.0.5 are vulnerable to Improper Input Validation in the setHtml function, invoked by Browsershot::html(), which can be bypassed by omitting the slashes in the file URI (e.g., file:../../../../etc/passwd). This is due to missing validations of the user input that should be blocking file URI schemes (e.g., file:// and file:/) in the HTML content. | |
| Weaknesses | CWE-20 | |
| References | 
         | 
        
  | 
| Metrics | 
        
        cvssV3_1
         
 
  | 
Status: PUBLISHED
Assigner: snyk
Published: 2025-02-05T05:00:15.399Z
Updated: 2025-03-16T13:16:06.494Z
Reserved: 2025-02-04T10:20:48.623Z
Link: CVE-2025-1022
Updated: 2025-02-05T19:29:26.599Z
Status : Received
Published: 2025-02-05T05:15:10.337
Modified: 2025-02-05T20:15:45.470
Link: CVE-2025-1022
No data.
ReportizFlow