An issue discovered in pdfmake 0.2.9 allows remote attackers to run arbitrary code via crafted POST request to the /pdf endpoint. NOTE: this is disputed because the behavior of the /pdf endpoint is intentional. The /pdf endpoint is only available after installing a test framework (that lives outside of the pdfmake applicaton). Anyone installing this is responsible for ensuring that it is only available to authorized testers.
References
Link | Resource |
---|---|
https://github.com/bpampuch/pdfmake/issues/2702 | Issue Tracking |
https://github.com/joaoviictorti/My-CVES/blob/main/CVE-2024-25180/README.md | Broken Link |
https://security.snyk.io/vuln/SNYK-JS-PDFMAKE-6347243 | Exploit Third Party Advisory |
https://www.youtube.com/watch?v=QcOlrWUGo6o | Exploit |
https://github.com/bpampuch/pdfmake/issues/2702 | Issue Tracking |
https://github.com/joaoviictorti/My-CVES/blob/main/CVE-2024-25180/README.md | Broken Link |
https://security.snyk.io/vuln/SNYK-JS-PDFMAKE-6347243 | Exploit Third Party Advisory |
https://www.youtube.com/watch?v=QcOlrWUGo6o | Exploit |
Configurations
History
13 May 2025, 14:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/bpampuch/pdfmake/issues/2702 - Issue Tracking | |
References | () https://github.com/joaoviictorti/My-CVES/blob/main/CVE-2024-25180/README.md - Broken Link | |
References | () https://security.snyk.io/vuln/SNYK-JS-PDFMAKE-6347243 - Exploit, Third Party Advisory | |
References | () https://www.youtube.com/watch?v=QcOlrWUGo6o - Exploit | |
CPE | cpe:2.3:a:pdfmake_project:pdfmake:0.2.9:*:*:*:*:*:*:* | |
First Time |
Pdfmake Project
Pdfmake Project pdfmake |
21 Nov 2024, 09:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/bpampuch/pdfmake/issues/2702 - | |
References | () https://github.com/joaoviictorti/My-CVES/blob/main/CVE-2024-25180/README.md - | |
References | () https://security.snyk.io/vuln/SNYK-JS-PDFMAKE-6347243 - | |
References | () https://www.youtube.com/watch?v=QcOlrWUGo6o - |
26 Aug 2024, 20:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CWE | CWE-94 |
01 May 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | (en) An issue discovered in pdfmake 0.2.9 allows remote attackers to run arbitrary code via crafted POST request to the /pdf endpoint. NOTE: this is disputed because the behavior of the /pdf endpoint is intentional. The /pdf endpoint is only available after installing a test framework (that lives outside of the pdfmake applicaton). Anyone installing this is responsible for ensuring that it is only available to authorized testers. |
19 Apr 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
29 Feb 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-29 18:15
Updated : 2025-05-13 14:46
NVD link : CVE-2024-25180
Mitre link : CVE-2024-25180
CVE.ORG link : CVE-2024-25180
JSON object : View
Products Affected
pdfmake_project
- pdfmake
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')