Логотип exploitDog
bind:CVE-2026-31898
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-31898

Количество 4

Количество 4

redhat логотип

CVE-2026-31898

9 дней назад

A flaw was found in jsPDF, a JavaScript library used for generating PDF documents. This vulnerability allows a remote attacker to inject arbitrary PDF objects, including JavaScript actions, into a generated PDF. This can occur if unsanitized user input is provided to the `createAnnotation` method's `color` parameter. When a user opens or interacts with the specially crafted PDF, these injected actions may execute, potentially leading to arbitrary code execution or sensitive information disclosure.

CVSS3: 8.1
EPSS: Низкий
nvd логотип

CVE-2026-31898

9 дней назад

jsPDF is a library to generate PDFs in JavaScript. Prior to version 4.2.1, user control of arguments of the `createAnnotation` method allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized input to the following method, a user can inject arbitrary PDF objects, such as JavaScript actions, which might trigger when the PDF is opened or interacted with the `createAnnotation`: `color` parameter. The vulnerability has been fixed in jsPDF@4.2.1. As a workaround, sanitize user input before passing it to the vulnerable API members.

CVSS3: 8.1
EPSS: Низкий
debian логотип

CVE-2026-31898

9 дней назад

jsPDF is a library to generate PDFs in JavaScript. Prior to version 4. ...

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-7x6v-j9x4-qf24

10 дней назад

jsPDF has a PDF Object Injection via FreeText color

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2026-31898

A flaw was found in jsPDF, a JavaScript library used for generating PDF documents. This vulnerability allows a remote attacker to inject arbitrary PDF objects, including JavaScript actions, into a generated PDF. This can occur if unsanitized user input is provided to the `createAnnotation` method's `color` parameter. When a user opens or interacts with the specially crafted PDF, these injected actions may execute, potentially leading to arbitrary code execution or sensitive information disclosure.

CVSS3: 8.1
0%
Низкий
9 дней назад
nvd логотип
CVE-2026-31898

jsPDF is a library to generate PDFs in JavaScript. Prior to version 4.2.1, user control of arguments of the `createAnnotation` method allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized input to the following method, a user can inject arbitrary PDF objects, such as JavaScript actions, which might trigger when the PDF is opened or interacted with the `createAnnotation`: `color` parameter. The vulnerability has been fixed in jsPDF@4.2.1. As a workaround, sanitize user input before passing it to the vulnerable API members.

CVSS3: 8.1
0%
Низкий
9 дней назад
debian логотип
CVE-2026-31898

jsPDF is a library to generate PDFs in JavaScript. Prior to version 4. ...

CVSS3: 8.1
0%
Низкий
9 дней назад
github логотип
GHSA-7x6v-j9x4-qf24

jsPDF has a PDF Object Injection via FreeText color

CVSS3: 8.1
0%
Низкий
10 дней назад

Уязвимостей на страницу