CVE-2024-21544

Versions of the package spatie/browsershot before 5.0.1 are vulnerable to Improper Input Validation due to improper URL validation in the setUrl method. An attacker can exploit this vulnerability by using leading whitespace (%20) before the file:// protocol, resulting in Local File Inclusion, which allows the attacker to read sensitive files on the server.
Configurations

No configuration.

History

01 Oct 2025, 11:15

Type Values Removed Values Added
Summary (en) Versions of the package spatie/browsershot before 5.0.1 are vulnerable to Improper Input Validation due to improper URL validation through the setUrl method. An attacker can exploit this vulnerability by using leading whitespace (%20) before the file:// protocol, resulting in Local File Inclusion, which allows the attacker to read sensitive files on the server. (en) Versions of the package spatie/browsershot before 5.0.1 are vulnerable to Improper Input Validation due to improper URL validation in the setUrl method. An attacker can exploit this vulnerability by using leading whitespace (%20) before the file:// protocol, resulting in Local File Inclusion, which allows the attacker to read sensitive files on the server.

04 Feb 2025, 14:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 8.6

13 Dec 2024, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-13 05:15

Updated : 2025-10-01 11:15


NVD link : CVE-2024-21544

Mitre link : CVE-2024-21544

CVE.ORG link : CVE-2024-21544


JSON object : View

Products Affected

No product.

CWE
CWE-20

Improper Input Validation