top of page
perceptive_background_267k.jpg

jsPDF is a library to generate PDFs in JavaScript. Prior to version 4.2.1, user control of the `options` argument of the `output` function allows attackers to i…

Published:

17 March 2026 at 23:00:00

Alert date:

18 March 2026 at 16:03:59

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Supply Chain & Dependencies

jsPDF library versions prior to 4.2.1 contain a vulnerability that allows attackers to inject arbitrary HTML and scripts into browser contexts when PDFs are opened. The vulnerability stems from insufficient sanitization of the options argument in the output function. Attackers can exploit this through web interfaces by providing malicious output options that get passed to victims. When victims create and open PDFs with the malicious payload, scripts execute in their browser context, potentially allowing extraction or modification of secrets. The vulnerability has been patched in version 4.2.1, and users can mitigate by sanitizing input before passing to the output method.

Technical details

Mitigation steps:

Affected products:

jsPDF

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page