Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7x6v-j9x4-qf24

Опубликовано: 17 мар. 2026
Источник: github
Github: Прошло ревью
CVSS3: 8.1

Описание

jsPDF has a PDF Object Injection via FreeText color

Impact

User control of arguments of the createAnnotation method allows users to inject arbitrary PDF objects, such as JavaScript actions.

If given the possibility to pass unsanitized input to the following method, a user can inject arbitrary PDF objects, such as JavaScript actions, which might trigger when the PDF is opened or interacted with..

  • createAnnotation: color parameter

Example attack vector:

import { jsPDF } from 'jspdf' const doc = new jsPDF(); const payload = '000000) /AA <</E <</S /Launch /F (calc.exe)>>>> ('; doc.createAnnotation({ type: 'freetext', bounds: { x: 10, y: 10, w: 120, h: 20 }, contents: 'hello', color: payload }); doc.save('test.pdf');

Patches

The vulnerability has been fixed in jsPDF@4.2.1.

Workarounds

Sanitize user input before passing it to the vulnerable API members.

Пакеты

Наименование

jspdf

npm
Затронутые версииВерсия исправления

<= 4.2.0

4.2.1

EPSS

Процентиль: 11%
0.00037
Низкий

8.1 High

CVSS3

Дефекты

CWE-116

Связанные уязвимости

CVSS3: 8.1
redhat
9 дней назад

A flaw was found in jsPDF, a JavaScript library used for generating PDF documents. This vulnerability allows a remote attacker to inject arbitrary PDF objects, including JavaScript actions, into a generated PDF. This can occur if unsanitized user input is provided to the `createAnnotation` method's `color` parameter. When a user opens or interacts with the specially crafted PDF, these injected actions may execute, potentially leading to arbitrary code execution or sensitive information disclosure.

CVSS3: 8.1
nvd
9 дней назад

jsPDF is a library to generate PDFs in JavaScript. Prior to version 4.2.1, user control of arguments of the `createAnnotation` method allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized input to the following method, a user can inject arbitrary PDF objects, such as JavaScript actions, which might trigger when the PDF is opened or interacted with the `createAnnotation`: `color` parameter. The vulnerability has been fixed in jsPDF@4.2.1. As a workaround, sanitize user input before passing it to the vulnerable API members.

CVSS3: 8.1
debian
9 дней назад

jsPDF is a library to generate PDFs in JavaScript. Prior to version 4. ...

EPSS

Процентиль: 11%
0.00037
Низкий

8.1 High

CVSS3

Дефекты

CWE-116