Логотип exploitDog
bind:CVE-2026-25755
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-25755

Количество 5

Количество 5

redhat логотип

CVE-2026-25755

около 1 месяца назад

jsPDF is a library to generate PDFs in JavaScript. Prior to 4.2.0, user control of the argument of the `addJS` method allows an attacker to inject arbitrary PDF objects into the generated document. By crafting a payload that escapes the JavaScript string delimiter, an attacker can execute malicious actions or alter the document structure, impacting any user who opens the generated PDF. The vulnerability has been fixed in jspdf@4.2.0. As a workaround, escape parentheses in user-provided JavaScript code before passing them to the `addJS` method.

CVSS3: 9.6
EPSS: Низкий
nvd логотип

CVE-2026-25755

около 1 месяца назад

jsPDF is a library to generate PDFs in JavaScript. Prior to 4.2.0, user control of the argument of the `addJS` method allows an attacker to inject arbitrary PDF objects into the generated document. By crafting a payload that escapes the JavaScript string delimiter, an attacker can execute malicious actions or alter the document structure, impacting any user who opens the generated PDF. The vulnerability has been fixed in jspdf@4.2.0. As a workaround, escape parentheses in user-provided JavaScript code before passing them to the `addJS` method.

CVSS3: 8.1
EPSS: Низкий
debian логотип

CVE-2026-25755

около 1 месяца назад

jsPDF is a library to generate PDFs in JavaScript. Prior to 4.2.0, use ...

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-9vjf-qc39-jprp

около 1 месяца назад

jsPDF has a PDF Object Injection via Unsanitized Input in addJS Method

CVSS3: 8.1
EPSS: Низкий
fstec логотип

BDU:2026-02102

около 1 месяца назад

Уязвимость функции addJS() библиотеки для создания PDF-файлов jsPDF, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2026-25755

jsPDF is a library to generate PDFs in JavaScript. Prior to 4.2.0, user control of the argument of the `addJS` method allows an attacker to inject arbitrary PDF objects into the generated document. By crafting a payload that escapes the JavaScript string delimiter, an attacker can execute malicious actions or alter the document structure, impacting any user who opens the generated PDF. The vulnerability has been fixed in jspdf@4.2.0. As a workaround, escape parentheses in user-provided JavaScript code before passing them to the `addJS` method.

CVSS3: 9.6
0%
Низкий
около 1 месяца назад
nvd логотип
CVE-2026-25755

jsPDF is a library to generate PDFs in JavaScript. Prior to 4.2.0, user control of the argument of the `addJS` method allows an attacker to inject arbitrary PDF objects into the generated document. By crafting a payload that escapes the JavaScript string delimiter, an attacker can execute malicious actions or alter the document structure, impacting any user who opens the generated PDF. The vulnerability has been fixed in jspdf@4.2.0. As a workaround, escape parentheses in user-provided JavaScript code before passing them to the `addJS` method.

CVSS3: 8.1
0%
Низкий
около 1 месяца назад
debian логотип
CVE-2026-25755

jsPDF is a library to generate PDFs in JavaScript. Prior to 4.2.0, use ...

CVSS3: 8.1
0%
Низкий
около 1 месяца назад
github логотип
GHSA-9vjf-qc39-jprp

jsPDF has a PDF Object Injection via Unsanitized Input in addJS Method

CVSS3: 8.1
0%
Низкий
около 1 месяца назад
fstec логотип
BDU:2026-02102

Уязвимость функции addJS() библиотеки для создания PDF-файлов jsPDF, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
0%
Низкий
около 1 месяца назад

Уязвимостей на страницу