{"id":"CVE-2025-53833","summary":"LaRecipe is vulnerable to Server-Side Template Injection attacks","details":"LaRecipe is an application that allows users to create documentation with Markdown inside a Laravel app. Versions prior to 2.8.1 are vulnerable to Server-Side Template Injection (SSTI), which could potentially lead to Remote Code Execution (RCE) in vulnerable configurations. Attackers could execute arbitrary commands on the server, access sensitive environment variables, and/or escalate access depending on server configuration. Users are strongly advised to upgrade to version v2.8.1 or later to receive a patch.","aliases":["GHSA-jv7x-xhv2-p5v2"],"modified":"2026-04-10T05:32:15.902960Z","published":"2025-07-14T22:56:38.957Z","database_specific":{"cwe_ids":["CWE-1336"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/53xxx/CVE-2025-53833.json","cna_assigner":"GitHub_M"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/53xxx/CVE-2025-53833.json"},{"type":"ADVISORY","url":"https://github.com/saleem-hadad/larecipe/security/advisories/GHSA-jv7x-xhv2-p5v2"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-53833"},{"type":"FIX","url":"https://github.com/saleem-hadad/larecipe/commit/c1d0d56889655ce5f2645db5acf0e78d5fc3b36b"},{"type":"FIX","url":"https://github.com/saleem-hadad/larecipe/pull/390"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/saleem-hadad/larecipe","events":[{"introduced":"0"},{"fixed":"c1d0d56889655ce5f2645db5acf0e78d5fc3b36b"}]}],"versions":["v1.0.0","v1.0.1","v1.1.0","v1.2.0","v1.2.1","v1.2.2","v1.2.3","v1.2.4","v1.2.5","v1.3.1","v1.3.2","v1.3.3","v1.3.4","v1.3.5","v1.3.6","v1.4.0","v2.1.0","v2.1.1","v2.1.2","v2.2.0","v2.2.1","v2.2.2","v2.2.3","v2.3.0","v2.4.0","v2.4.1","v2.4.2","v2.4.3","v2.4.4","v2.5.0","v2.6.0","v2.6.1","v2.7.0","v2.8.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-53833.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"}]}