CVE-2026-26830

pdf-image (npm package) through version 2.0.0 allows OS command injection via the pdfFilePath parameter. The constructGetInfoCommand and constructConvertCommandForPage functions use util.format() to interpolate user-controlled file paths into shell command strings that are executed via child_process.exec()
Configurations

Configuration 1 (hide)

cpe:2.3:a:pdf-image_project:pdf-image:*:*:*:*:*:node.js:*:*

History

02 Apr 2026, 20:13

Type Values Removed Values Added
First Time Pdf-image Project pdf-image
Pdf-image Project
References () https://github.com/mooz/node-pdf-image - () https://github.com/mooz/node-pdf-image - Product
References () https://github.com/zebbernCVE/CVE-2026-26830 - () https://github.com/zebbernCVE/CVE-2026-26830 - Exploit, Third Party Advisory
References () https://www.npmjs.com/package/pdf-image - () https://www.npmjs.com/package/pdf-image - Product
CPE cpe:2.3:a:pdf-image_project:pdf-image:*:*:*:*:*:node.js:*:*

27 Mar 2026, 05:16

Type Values Removed Values Added
CWE CWE-94
Summary
  • (es) pdf-image (paquete npm) hasta la versión 2.0.0 permite la inyección de comandos del sistema operativo a través del parámetro pdfFilePath. Las funciones constructGetInfoCommand y constructConvertCommandForPage usan util.format() para interpolar rutas de archivo controladas por el usuario en cadenas de comandos de shell que se ejecutan a través de child_process.exec().

25 Mar 2026, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-25 15:16

Updated : 2026-04-02 20:13


NVD link : CVE-2026-26830

Mitre link : CVE-2026-26830

CVE.ORG link : CVE-2026-26830


JSON object : View

Products Affected

pdf-image_project

  • pdf-image
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')