Логотип exploitDog
bind:CVE-2026-25940
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-25940

Количество 4

Количество 4

redhat логотип

CVE-2026-25940

около 1 месяца назад

jsPDF is a library to generate PDFs in JavaScript. Prior to 4.2.0, user control of properties and methods of the Acroform module allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized input to one of the following property, a user can inject arbitrary PDF objects, such as JavaScript actions, which are executed when the victim hovers over the radio option. The vulnerability has been fixed in jsPDF@4.2.0. As a workaround, sanitize user input before passing it to the vulnerable API members.

CVSS3: 9.6
EPSS: Низкий
nvd логотип

CVE-2026-25940

около 1 месяца назад

jsPDF is a library to generate PDFs in JavaScript. Prior to 4.2.0, user control of properties and methods of the Acroform module allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized input to one of the following property, a user can inject arbitrary PDF objects, such as JavaScript actions, which are executed when the victim hovers over the radio option. The vulnerability has been fixed in jsPDF@4.2.0. As a workaround, sanitize user input before passing it to the vulnerable API members.

CVSS3: 8.1
EPSS: Низкий
debian логотип

CVE-2026-25940

около 1 месяца назад

jsPDF is a library to generate PDFs in JavaScript. Prior to 4.2.0, use ...

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-p5xg-68wr-hm3m

около 1 месяца назад

jsPDF has a PDF Injection in AcroForm module allows Arbitrary JavaScript Execution (RadioButton.createOption and "AS" property)

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2026-25940

jsPDF is a library to generate PDFs in JavaScript. Prior to 4.2.0, user control of properties and methods of the Acroform module allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized input to one of the following property, a user can inject arbitrary PDF objects, such as JavaScript actions, which are executed when the victim hovers over the radio option. The vulnerability has been fixed in jsPDF@4.2.0. As a workaround, sanitize user input before passing it to the vulnerable API members.

CVSS3: 9.6
0%
Низкий
около 1 месяца назад
nvd логотип
CVE-2026-25940

jsPDF is a library to generate PDFs in JavaScript. Prior to 4.2.0, user control of properties and methods of the Acroform module allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized input to one of the following property, a user can inject arbitrary PDF objects, such as JavaScript actions, which are executed when the victim hovers over the radio option. The vulnerability has been fixed in jsPDF@4.2.0. As a workaround, sanitize user input before passing it to the vulnerable API members.

CVSS3: 8.1
0%
Низкий
около 1 месяца назад
debian логотип
CVE-2026-25940

jsPDF is a library to generate PDFs in JavaScript. Prior to 4.2.0, use ...

CVSS3: 8.1
0%
Низкий
около 1 месяца назад
github логотип
GHSA-p5xg-68wr-hm3m

jsPDF has a PDF Injection in AcroForm module allows Arbitrary JavaScript Execution (RadioButton.createOption and "AS" property)

CVSS3: 8.1
0%
Низкий
около 1 месяца назад

Уязвимостей на страницу