First published: Wed Feb 05 2025(Updated: )
Versions of the package spatie/browsershot before 5.0.5 are vulnerable to Improper Input Validation due to improper URL validation through the setUrl method, which results in a Local File Inclusion allowing the attacker to read sensitive files. **Note:** This is a bypass of the fix for [CVE-2024-21549](https://security.snyk.io/vuln/SNYK-PHP-SPATIEBROWSERSHOT-8533023).
Credit: report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
Spatie Browsershot | <5.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1026 has a high severity due to the potential for Local File Inclusion resulting in exposure of sensitive files.
To fix CVE-2025-1026, upgrade the spatie/browsershot package to version 5.0.5 or later.
CVE-2025-1026 addresses an issue of improper URL validation in the setUrl method of spatie/browsershot.
The impact of CVE-2025-1026 allows attackers to read sensitive files on the server due to Local File Inclusion.
Versions of spatie/browsershot before 5.0.5 are affected by CVE-2025-1026.