CVE-2022-25765

HIGH

Pdfkit < 0.8.7.2 - Command Injection

Title source: rule

Description

The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sanitized.

Exploits (12)

exploitdb WORKING POC VERIFIED
by UNICORD · pythonlocalruby
https://www.exploit-db.com/exploits/51293
nomisec WORKING POC 27 stars
by UNICORDev · poc
https://github.com/UNICORDev/exploit-CVE-2022-25765
nomisec WORKING POC 20 stars
by PurpleWaveIO · poc
https://github.com/PurpleWaveIO/CVE-2022-25765-pdfkit-Exploit-Reverse-Shell
nomisec WORKING POC 15 stars
by shamo0 · poc
https://github.com/shamo0/PDFkit-CMD-Injection
nomisec WORKING POC 10 stars
by nikn0laty · poc
https://github.com/nikn0laty/PDFkit-CMD-Injection-CVE-2022-25765
nomisec WORKING POC 3 stars
by LordRNA · poc
https://github.com/LordRNA/CVE-2022-25765
gitlab WORKING POC
by lowercasenumbers · poc
https://gitlab.com/lowercasenumbers/cve-2022-25765
nomisec WORKING POC
by lst15 · poc
https://github.com/lst15/pdfkit-cve-2022-25765
nomisec WORKING POC
by lowercasenumbers · poc
https://github.com/lowercasenumbers/CVE-2022-25765
github WORKING POC
by dugisan3rd · pythonpoc
https://github.com/dugisan3rd/exploit/tree/main/cve-2022-25765
nomisec WORKING POC
by lekosbelas · poc
https://github.com/lekosbelas/PDFkit-CMD-Injection
nomisec STUB
by Wai-Yan-Kyaw · poc
https://github.com/Wai-Yan-Kyaw/PDFKitExploit

Scores

CVSS v3 7.3
EPSS 0.8879
EPSS Percentile 99.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Details

Status published
Products (5)
fedoraproject/fedora 35
fedoraproject/fedora 36
fedoraproject/fedora 37
pdfkit_project/pdfkit 0.0.0
rubygems/pdfkit 0 - 0.8.7.2RubyGems
Published Sep 09, 2022
Tracked Since Feb 18, 2026