{"uuid": "0bc3f718-7a73-4fac-89fb-8a787a76d244", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1022", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7127", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1022\n\ud83d\udd25 CVSS Score: 8.8 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:P)\n\ud83d\udd39 Description: Versions of the package spatie/browsershot before 5.0.5 are vulnerable to Improper Input Validation in the setHtml function, invoked by Browsershot::html(), which can be bypassed by omitting the slashes in the file URI (e.g., file:../../../../etc/passwd). This is due to missing validations of the user input that should be blocking file URI schemes (e.g., file:// and file:/) in the HTML content.\n\ud83d\udccf Published: 2025-02-05T05:00:15.399Z\n\ud83d\udccf Modified: 2025-03-11T12:19:33.865Z\n\ud83d\udd17 References:\n1. https://security.snyk.io/vuln/SNYK-PHP-SPATIEBROWSERSHOT-8496747\n2. https://github.com/spatie/browsershot/commit/bcfd608b264fab654bf78e199bdfbb03e9323eb7\n3. https://github.com/spatie/browsershot/commit/e3273974506865a24fbb5b65b534d8d4b8dfbf72\n4. https://gist.github.com/mrdgef/a820837c530e09e1dd725e013e0d4341", "creation_timestamp": "2025-03-11T12:40:34.000000Z"}