CVE-2025-1026: Browsershot Local File Inclusion
Versions of the package spatie/browsershot before 5.0.5 are vulnerable to Improper Input Validation due to improper URL validation through the setUrl method, which results in a Local File Inclusion allowing the attacker to read sensitive files.
Note:
This is a bypass of the fix for CVE-2024-21549.
References
- gist.github.com/chuajianshen/6291920112fcf1543fa7b43862112be6
- gist.github.com/mrdgef/54a8783408220c67c1b859df38a52d65
- github.com/advisories/GHSA-f2q5-6mx7-q9qq
- github.com/spatie/browsershot
- github.com/spatie/browsershot/commit/e3273974506865a24fbb5b65b534d8d4b8dfbf72
- github.com/spatie/browsershot/pull/908
- nvd.nist.gov/vuln/detail/CVE-2025-1026
- security.snyk.io/vuln/SNYK-PHP-SPATIEBROWSERSHOT-8533024
Detect and mitigate CVE-2025-1026 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →