CVE-2026-27625
EUVD-2026-1363820.03.2026, 09:16
Stirling-PDF is a locally hosted web application that performs various operations on PDF files. In versions prior to 2.5.2, the /api/v1/convert/markdown/pdf endpoint extracts user-supplied ZIP entries without path checks. Any authenticated user can write files outside the intended temporary working directory, leading to arbitrary file write with the privileges of the Stirling-PDF process user (stirlingpdfuser). This can overwrite writable files and compromise data integrity, with further impact depending on writable paths. The issue was fixed in version 2.5.2.
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| stirling | stirling_pdf | 𝑥 < 2.5.2 |
𝑥
= Vulnerable software versions