jsPDF is a library to generate PDFs in JavaScript. Prior to 4.1.0, user control of properties and methods of the Acroform module allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized input to one of the following methods or properties, a user can inject arbitrary PDF objects, such as JavaScript actions, which are executed when the victim opens the document. The vulnerable API members are AcroformChoiceField.addOption, AcroformChoiceField.setOptions, AcroFormCheckBox.appearanceState, and AcroFormRadioButton.appearanceState. The vulnerability has been fixed in jsPDF@4.1.0.
References
| Link | Resource |
|---|---|
| https://github.com/parallax/jsPDF/commit/da291a5f01b96282545c9391996702cdb8879f79 | Patch |
| https://github.com/parallax/jsPDF/releases/tag/v4.1.0 | Release Notes |
| https://github.com/parallax/jsPDF/security/advisories/GHSA-pqxr-3g65-p328 | Exploit Vendor Advisory |
Configurations
History
18 Feb 2026, 15:02
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/parallax/jsPDF/commit/da291a5f01b96282545c9391996702cdb8879f79 - Patch | |
| References | () https://github.com/parallax/jsPDF/releases/tag/v4.1.0 - Release Notes | |
| References | () https://github.com/parallax/jsPDF/security/advisories/GHSA-pqxr-3g65-p328 - Exploit, Vendor Advisory | |
| Summary |
|
|
| First Time |
Parall
Parall jspdf |
|
| CPE | cpe:2.3:a:parall:jspdf:*:*:*:*:*:node.js:*:* |
02 Feb 2026, 23:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-02 23:16
Updated : 2026-02-18 15:02
NVD link : CVE-2026-24737
Mitre link : CVE-2026-24737
CVE.ORG link : CVE-2026-24737
JSON object : View
Products Affected
parall
- jspdf
CWE
CWE-116
Improper Encoding or Escaping of Output
