CVE-2025-53833 – binarytorch/larecipe
Package
Manager: composer
Name: binarytorch/larecipe
Vulnerable Version: >=0 <2.8.1
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
EPSS: 0.24944 pctl0.95954
Details
LaRecipe is vulnerable to Server-Side Template Injection attacks ### Impact Attackers could: 1. Execute arbitrary commands on the server 2. Access sensitive environment variables 3. Escalate access depending on server configuration A critical vulnerability was discovered in LaRecipe that allows an attacker to perform Server-Side Template Injection (SSTI), potentially leading to Remote Code Execution (RCE) in vulnerable configurations. ### Patches Users are strongly advised to upgrade to version v2.8.1 or later. ### Credit We would like to thank **Roman Ananev** for responsibly identifying and reporting this vulnerability.
Metadata
Created: 2025-07-14T21:22:01Z
Modified: 2025-07-28T16:50:03Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/07/GHSA-jv7x-xhv2-p5v2/GHSA-jv7x-xhv2-p5v2.json
CWE IDs: ["CWE-1336"]
Alternative ID: GHSA-jv7x-xhv2-p5v2
Finding: F422
Auto approve: 1