CVE-2025-55150

Stirling-PDF · Stirling-PDF

A high-severity vulnerability has been discovered in Stirling-PDF, a locally hosted web application for PDF manipulation.

Executive summary

A high-severity vulnerability has been discovered in Stirling-PDF, a locally hosted web application for PDF manipulation. This flaw could allow an unauthenticated remote attacker to compromise the underlying server, leading to a complete loss of confidentiality and integrity for all processed documents and the host system. Organizations using this software are at significant risk of data breaches and server compromise.

Vulnerability

The vulnerability allows a remote, unauthenticated attacker to achieve arbitrary code execution on the server running the Stirling-PDF application. Exploitation is possible by uploading a specially crafted PDF file. When the application's backend attempts to process the malicious file, a flaw in a PDF parsing library is triggered, allowing the attacker's embedded code to run with the permissions of the web application user.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.6. Successful exploitation would have a severe business impact, likely resulting in a full system compromise of the Stirling-PDF server. This could lead to the unauthorized access and theft of all sensitive documents processed by the application, reputational damage, and regulatory fines if confidential customer or corporate data is exposed. Furthermore, a compromised server could be used as a pivot point to launch further attacks against the internal network, escalating the scope of the breach.

Remediation

Immediate Action: The primary remediation is to apply the security updates provided by the vendor for Stirling-PDF immediately. Prioritize patching for systems that are exposed to the internet. After patching, it is crucial to monitor for any signs of exploitation attempts that may have occurred before the update and to review historical access and application logs for indicators of compromise.

Proactive Monitoring: Security teams should actively monitor for anomalous activity on Stirling-PDF servers. In application and system logs, look for unexpected errors related to PDF processing, suspicious file uploads, or the execution of unexpected processes (e.g., sh, powershell.exe, curl) spawned by the web server's user account. On the network level, monitor for unusual outbound connections from the server, which could indicate a reverse shell or data exfiltration.

Compensating Controls: If immediate patching is not feasible, implement the following compensating controls to reduce risk:

  • Restrict network access to the application, allowing connections only from trusted internal IP addresses.
  • Place the application behind a Web Application Firewall (WAF) with rules configured to inspect and block malicious file uploads.
  • Run the Stirling-PDF application in a sandboxed or containerized environment with minimal privileges and strict egress filtering to prevent it from accessing the internal network.

Exploitation status

Public Exploit Available: False

Analyst recommendation

Given the High CVSS score of 8.6, this vulnerability presents a critical risk to the organization and requires immediate attention. The potential for unauthenticated remote code execution means that any internet-facing instance of Stirling-PDF is a prime target for attack. Although this CVE is not currently on the CISA KEV list, its characteristics make it a likely candidate for future inclusion. We strongly recommend that all system owners identify vulnerable instances within their environment and apply the vendor-supplied patches as the highest priority action to prevent system compromise.