top of page
perceptive_background_267k.jpg

jsPDF is a library to generate PDFs in JavaScript. Prior to version 4.2.1, user control of the `options` argument of the `output` function allows attackers to i…

Published:

17 maart 2026 om 23:00:00

Alert date:

18 maart 2026 om 16:03:59

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Supply Chain & Dependencies

jsPDF library versions prior to 4.2.1 contain a vulnerability that allows attackers to inject arbitrary HTML and scripts into browser contexts when PDFs are opened. The vulnerability stems from insufficient sanitization of the options argument in the output function. Attackers can exploit this through web interfaces by providing malicious output options that get passed to victims. When victims create and open PDFs with the malicious payload, scripts execute in their browser context, potentially allowing extraction or modification of secrets. The vulnerability has been patched in version 4.2.1, and users can mitigate by sanitizing input before passing to the output method.

Technical details

Mitigation steps:

Affected products:

jsPDF

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page