Pandoc Pandemonium: How Hackers Tried and Failed to Breach AWS with a Linux Flaw
Wiz has discovered a vulnerability in Pandoc that allows attackers to exploit AWS Instance Metadata Service. The flaw, CVE-2025-51591, involves SSRF attacks using crafted HTML iframes. Thankfully, IMDSv2 helps block these shenanigans, but organizations are urged to enforce it, keeping EC2 instances safer than a cat in a bubble wrap factory.

Hot Take:
Oh, Pandoc, you sneaky little document converter! Who would have thought that your penchant for rendering HTML iframes would turn you into a gateway for cyber shenanigans? But hey, when life gives you SSRF vulnerabilities, make sure you have IMDSv2 lemonade handy, or be ready to watch your AWS credentials fly away like a flock of startled birds!
Key Points:
– Cloud security firm Wiz discovered a security flaw in Pandoc being exploited to target AWS’s Instance Metadata Service.
– The vulnerability (CVE-2025-51591) involves a Server-Side Request Forgery (SSRF) that can be triggered via specially crafted HTML iframes.
– Attackers can exploit SSRF flaws to access AWS Instance Metadata, potentially leading to credential theft and unauthorized cloud resource access.
– The shift from IMDSv1 to the more secure IMDSv2 protocol helps mitigate such attacks by requiring token-based authentication.
– Mitigating this flaw involves using specific Pandoc options or sanitizing inputs to prevent iframe exploitation.