{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-14T17:42:44.813","vulnerabilities":[{"cve":{"id":"CVE-2025-1026","sourceIdentifier":"report@snyk.io","published":"2025-02-05T05:15:10.687","lastModified":"2025-02-05T05:15:10.687","vulnStatus":"Awaiting Analysis","cveTags":[],"descriptions":[{"lang":"en","value":"Versions of the package spatie\/browsershot before 5.0.5 are vulnerable to Improper Input Validation due to improper URL validation through the setUrl method, which results in a Local File Inclusion allowing the attacker to read sensitive files.\r\r**Note:**\r\rThis is a bypass of the fix for [CVE-2024-21549](https:\/\/security.snyk.io\/vuln\/SNYK-PHP-SPATIEBROWSERSHOT-8533023)."},{"lang":"es","value":"Las versiones del paquete spatie\/browsershot anteriores a la 5.0.5 son vulnerables a la validación de entrada incorrecta debido a la validación incorrecta de URL a través del método setUrl, lo que da como resultado una inclusión de archivo local que permite al atacante leer archivos confidenciales. **Nota:** Esta es una omisión de la corrección para [CVE-2024-21549](https:\/\/security.snyk.io\/vuln\/SNYK-PHP-SPATIEBROWSERSHOT-8533023)."}],"metrics":{"cvssMetricV40":[{"source":"report@snyk.io","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0\/AV:N\/AC:L\/AT:N\/PR:N\/UI:N\/VC:N\/VI:N\/VA:N\/SC:H\/SI:N\/SA:N\/E:P\/CR:X\/IR:X\/AR:X\/MAV:X\/MAC:X\/MAT:X\/MPR:X\/MUI:X\/MVC:X\/MVI:X\/MVA:X\/MSC:X\/MSI:X\/MSA:X\/S:X\/AU:X\/R:X\/V:X\/RE:X\/U:X","baseScore":7.7,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"HIGH","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"PROOF_OF_CONCEPT","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"report@snyk.io","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:C\/C:H\/I:N\/A:N","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":4.0}]},"weaknesses":[{"source":"report@snyk.io","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]}],"references":[{"url":"https:\/\/gist.github.com\/chuajianshen\/6291920112fcf1543fa7b43862112be6","source":"report@snyk.io"},{"url":"https:\/\/gist.github.com\/mrdgef\/54a8783408220c67c1b859df38a52d65","source":"report@snyk.io"},{"url":"https:\/\/github.com\/spatie\/browsershot\/commit\/e3273974506865a24fbb5b65b534d8d4b8dfbf72","source":"report@snyk.io"},{"url":"https:\/\/github.com\/spatie\/browsershot\/pull\/908","source":"report@snyk.io"},{"url":"https:\/\/security.snyk.io\/vuln\/SNYK-PHP-SPATIEBROWSERSHOT-8533024","source":"report@snyk.io"}]}}]}