jsPDF is a library to generate PDFs in JavaScript. Prior to 4.1.0, user control of the first argument of the addImage method results in denial of service. If given the possibility to pass unsanitized image data or URLs to the addImage method, a user can provide a harmful BMP file that results in out of memory errors and denial of service. Harmful BMP files have large width and/or height entries in their headers, which lead to excessive memory allocation. The html method is also affected. The vulnerability has been fixed in jsPDF@4.1.0.
References
| Link | Resource |
|---|---|
| https://github.com/parallax/jsPDF/commit/ae4b93f76d8fc1baa5614bd5fdb5d174c3b85f0d | Patch |
| https://github.com/parallax/jsPDF/releases/tag/v4.1.0 | Release Notes |
| https://github.com/parallax/jsPDF/security/advisories/GHSA-95fx-jjr5-f39c | Vendor Advisory Exploit |
Configurations
History
18 Feb 2026, 14:41
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References | () https://github.com/parallax/jsPDF/commit/ae4b93f76d8fc1baa5614bd5fdb5d174c3b85f0d - Patch | |
| References | () https://github.com/parallax/jsPDF/releases/tag/v4.1.0 - Release Notes | |
| References | () https://github.com/parallax/jsPDF/security/advisories/GHSA-95fx-jjr5-f39c - Vendor Advisory, Exploit | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| First Time |
Parall
Parall jspdf |
|
| CPE | cpe:2.3:a:parall:jspdf:*:*:*:*:*:node.js:*:* |
02 Feb 2026, 23:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-02 23:16
Updated : 2026-02-18 14:41
NVD link : CVE-2026-24133
Mitre link : CVE-2026-24133
CVE.ORG link : CVE-2026-24133
JSON object : View
Products Affected
parall
- jspdf
CWE
CWE-770
Allocation of Resources Without Limits or Throttling
