Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-25940

Опубликовано: 19 фев. 2026
Источник: redhat
CVSS3: 9.6
EPSS Низкий

Описание

jsPDF is a library to generate PDFs in JavaScript. Prior to 4.2.0, user control of properties and methods of the Acroform module allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized input to one of the following property, a user can inject arbitrary PDF objects, such as JavaScript actions, which are executed when the victim hovers over the radio option. The vulnerability has been fixed in jsPDF@4.2.0. As a workaround, sanitize user input before passing it to the vulnerable API members.

A flaw was found in jsPDF. The properties and methods of the Acroform module accept user input without sanitization, allowing an attacker to inject arbitrary PDF objects, such as JavaScript actions. Specifically, if an attacker can supply a specially crafted input to the AcroformChildClass.appearanceState property, JavaScript actions can be executed when a user opens the generated PDF document and hovers over the radio button.

Отчет

To exploit this flaw, an attacker must be able to supply a specially crafted input to the AcroformChildClass.appearanceState property of the Acroform module and convince a user to open the generated PDF document, resulting in arbitrary JavaScript execution when the user interacts with radio buttons. Due to these reasons, this vulnerability has been rated with an important severity.

Меры по смягчению последствий

To mitigate this vulnerability, sanitize the user-provided input before passing it to the AcroformChildClass.appearanceState property or other API members. Additionally, do not open PDF documents from untrusted sources.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Advanced Cluster Security 4advanced-cluster-security/rhacs-main-rhel8Affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-116
https://bugzilla.redhat.com/show_bug.cgi?id=2441016jsPDF: PDF injection in AcroForm module allows arbitrary JavaScript execution (RadioButton children)

EPSS

Процентиль: 11%
0.00036
Низкий

9.6 Critical

CVSS3

Связанные уязвимости

CVSS3: 8.1
nvd
около 1 месяца назад

jsPDF is a library to generate PDFs in JavaScript. Prior to 4.2.0, user control of properties and methods of the Acroform module allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized input to one of the following property, a user can inject arbitrary PDF objects, such as JavaScript actions, which are executed when the victim hovers over the radio option. The vulnerability has been fixed in jsPDF@4.2.0. As a workaround, sanitize user input before passing it to the vulnerable API members.

CVSS3: 8.1
debian
около 1 месяца назад

jsPDF is a library to generate PDFs in JavaScript. Prior to 4.2.0, use ...

CVSS3: 8.1
github
около 1 месяца назад

jsPDF has a PDF Injection in AcroForm module allows Arbitrary JavaScript Execution (RadioButton.createOption and "AS" property)

EPSS

Процентиль: 11%
0.00036
Низкий

9.6 Critical

CVSS3