This issue affects the
ExtractEmbeddedFiles example in Apache PDFBox: from 2.0.24 through 2.0.35, from 3.0.0 through 3.0.6.
The ExtractEmbeddedFiles example contains a path traversal vulnerability (CWE-22) because
the filename that is obtained from
PDComplexFileSpecification.getFilename() is appended to the extraction path.
Users who have copied this example into their production code should
review it to ensure that the extraction path is acceptable. The example
has been changed accordingly, now the initial path and the extraction
paths are converted into canonical paths and it is verified that
extraction path contains the initial path. The documentation has also
been adjusted.
References
| Link | Resource |
|---|---|
| https://github.com/JoakimBulow/ | Not Applicable |
| https://lists.apache.org/thread/gyfq5tcrxfv7rx0z2yyx4hb3h53ndffw | Mailing List Vendor Advisory |
| http://www.openwall.com/lists/oss-security/2026/03/10/1 | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
13 Mar 2026, 16:45
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| First Time |
Apache
Apache pdfbox |
|
| CPE | cpe:2.3:a:apache:pdfbox:*:*:*:*:*:*:*:* | |
| References | () https://github.com/JoakimBulow/ - Not Applicable | |
| References | () https://lists.apache.org/thread/gyfq5tcrxfv7rx0z2yyx4hb3h53ndffw - Mailing List, Vendor Advisory | |
| References | () http://www.openwall.com/lists/oss-security/2026/03/10/1 - Mailing List, Third Party Advisory |
10 Mar 2026, 18:18
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-10 18:18
Updated : 2026-03-13 16:45
NVD link : CVE-2026-23907
Mitre link : CVE-2026-23907
CVE.ORG link : CVE-2026-23907
JSON object : View
Products Affected
apache
- pdfbox
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
