We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-1022



Description

Versions of the package spatie/browsershot before 5.0.5 are vulnerable to Improper Input Validation in the setHtml function, invoked by Browsershot::html(), which can be bypassed by omitting the slashes in the file URI (e.g., file:../../../../etc/passwd). This is due to missing validations of the user input that should be blocking file URI schemes (e.g., file:// and file:/) in the HTML content.

Reserved 2025-02-04 | Published 2025-02-05 | Updated 2025-02-05 | Assigner snyk


HIGH: 8.8CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:PHIGH: 8.2CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N/E:P

Problem types

Improper Input Validation

Credits

Ee Yang Tee

References

security.snyk.io/vuln/SNYK-PHP-SPATIEBROWSERSHOT-8496747

github.com/...ommit/bcfd608b264fab654bf78e199bdfbb03e9323eb7

github.com/...ommit/e3273974506865a24fbb5b65b534d8d4b8dfbf72

gist.github.com/mrdgef/a820837c530e09e1dd725e013e0d4341

cve.org (CVE-2025-1022)

nvd.nist.gov (CVE-2025-1022)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2025-1022

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.