{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T14:05:12.145","vulnerabilities":[{"cve":{"id":"CVE-2025-51591","sourceIdentifier":"cve@mitre.org","published":"2025-07-11T14:15:27.347","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A Server-Side Request Forgery (SSRF) in JGM Pandoc v3.6.4 allows attackers to gain access to and compromise the whole infrastructure via injecting a crafted iframe. Note: Some users have stated that Pandoc by default can retrieve and parse untrusted HTML content which can enable SSRF vulnerabilities. Using the ‘--sandbox’ option or ‘pandoc-server’ can mitigate such vulnerabilities. Using pandoc with an external ‘--pdf-engine’ can also enable SSRF vulnerabilities, such as CVE-2022-35583 in wkhtmltopdf."},{"lang":"es","value":"Server-Side Request Forgery (SSRF) en JGM Pandoc v3.6.4 permite a los atacantes obtener acceso y comprometer toda la infraestructura mediante la inyección de un iframe manipulado específicamente."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":3.7,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":1.4}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-918"}]}],"references":[{"url":"http://jgm.com","source":"cve@mitre.org"},{"url":"http://pandoc.com","source":"cve@mitre.org"},{"url":"https://github.com/RealestName/Vulnerability-Research/tree/main/CVE-2025-51591","source":"cve@mitre.org"},{"url":"https://github.com/jgm/pandoc/discussions/11200","source":"cve@mitre.org"},{"url":"https://github.com/jgm/pandoc/issues/10682","source":"cve@mitre.org"},{"url":"https://github.com/jgm/pandoc/issues/11261","source":"cve@mitre.org"},{"url":"https://github.com/jgm/pandoc/issues/8874","source":"cve@mitre.org"},{"url":"https://github.com/jgm/pandoc/pull/11262","source":"cve@mitre.org"},{"url":"https://www.wiz.io/blog/imds-anomaly-hunting-zero-day","source":"cve@mitre.org"},{"url":"https://github.com/jgm/pandoc/commit/67edf7ce7cd3563a180ae44bd122b012e22364f8","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"},{"url":"https://github.com/jgm/pandoc/issues/10682","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"},{"url":"https://pandoc.org","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"},{"url":"https://www.wiz.io/blog/imds-anomaly-hunting-zero-day","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"},{"url":"not-applicable:http://jgm.com/","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"},{"url":"not-applicable:http://pandoc.com/","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}]}}]}