VYPR
Critical severity10.0NVD Advisory· Published Jul 14, 2025· Updated Apr 15, 2026

CVE-2025-53833

CVE-2025-53833

Description

LaRecipe is an application that allows users to create documentation with Markdown inside a Laravel app. Versions prior to 2.8.1 are vulnerable to Server-Side Template Injection (SSTI), which could potentially lead to Remote Code Execution (RCE) in vulnerable configurations. Attackers could execute arbitrary commands on the server, access sensitive environment variables, and/or escalate access depending on server configuration. Users are strongly advised to upgrade to version v2.8.1 or later to receive a patch.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
binarytorch/larecipePackagist
< 2.8.12.8.1

Patches

1
c1d0d5688965

fix replace links (#390)

https://github.com/saleem-hadad/larecipeSaleem Hadad سليم حدادJul 14, 2025via ghsa
1 file changed · +1 1
  • src/Models/Documentation.php+1 1 modified
    @@ -97,7 +97,7 @@ public static function replaceLinks($version, $content)
     
             $content = str_replace('{{route}}', trim(config('larecipe.docs.route'), '/'), $content);
     
    -        $content = str_replace('"#', '"'.request()->getRequestUri().'#', $content);
    +        $content = str_replace('"#', '"'.request()->getPathInfo().'#', $content);
     
             return $content;
         }
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

5

News mentions

0

No linked articles in our index yet.