Bug 2379953
| Summary: | CVE-2025-51591 pandoc: Server-Side Request Forgery in Pandoc [epel-10] | ||
|---|---|---|---|
| Product: | [Fedora] Fedora EPEL | Reporter: | Jon Moroney <jmoroney> | 
| Component: | pandoc | Assignee: | Jens Petersen <petersen> | 
| Status: | POST --- | QA Contact: | Fedora Extras Quality Assurance <extras-qa> | 
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | epel10 | CC: | castedo, michel, petersen | 
| Target Milestone: | --- | Keywords: | Security, SecurityTracking | 
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | {"flaws": ["72b33082-8eec-48b6-b980-41f8289080d9"]} | ||
| Fixed In Version: | Doc Type: | --- | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- | 
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | |||
| Bug Blocks: | 2379543 | ||
| 
        
          Description
        
        
          Jon Moroney
        
        
        
        
        
          2025-07-14 20:19:00 UTC
        
       The only thing I can do here is to patch the manpage to explain the potential threat. The upstream commit related to this just updated the manual to update about the potential threat of embedding iframe via pdf: https://github.com/jgm/pandoc/commit/67edf7ce7cd3563a180ae44bd122b012e22364f8 But it is strongly not recommended to use pandoc on raw untrusted input. The text appears in https://pandoc.org/MANUAL.html#a-note-on-security |