Bug 2379954
| Summary: | CVE-2025-51591 pandoc: Server-Side Request Forgery in Pandoc [epel-9] | ||
|---|---|---|---|
| Product: | [Fedora] Fedora EPEL | Reporter: | Jon Moroney <jmoroney> |
| Component: | pandoc | Assignee: | Jens Petersen <petersen> |
| Status: | POST --- | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | epel9 | CC: | castedo, michel, petersen |
| Target Milestone: | --- | Keywords: | Security, SecurityTracking |
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | {"flaws": ["72b33082-8eec-48b6-b980-41f8289080d9"]} | ||
| Fixed In Version: | Doc Type: | --- | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | |||
| Bug Blocks: | 2379543 | ||
|
Description
Jon Moroney
2025-07-14 20:19:04 UTC
The only thing I can do here is to patch the manpage to explain the potential threat. The upstream commit related to this just updated the manual to mention the potential threat of embedding iframe via pdf: https://github.com/jgm/pandoc/commit/67edf7ce7cd3563a180ae44bd122b012e22364f8 But it is strongly advised not to use pandoc on raw untrusted input. The text appears in https://pandoc.org/MANUAL.html#a-note-on-security |