pdf-image (npm package) through version 2.0.0 allows OS command injection via the pdfFilePath parameter. The constructGetInfoCommand and constructConvertCommandForPage functions use util.format() to interpolate user-controlled file paths into shell command strings that are executed via child_process.exec()
References
| Link | Resource |
|---|---|
| https://github.com/mooz/node-pdf-image | Product |
| https://github.com/zebbernCVE/CVE-2026-26830 | Exploit Third Party Advisory |
| https://www.npmjs.com/package/pdf-image | Product |
Configurations
History
02 Apr 2026, 20:13
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Pdf-image Project pdf-image
Pdf-image Project |
|
| References | () https://github.com/mooz/node-pdf-image - Product | |
| References | () https://github.com/zebbernCVE/CVE-2026-26830 - Exploit, Third Party Advisory | |
| References | () https://www.npmjs.com/package/pdf-image - Product | |
| CPE | cpe:2.3:a:pdf-image_project:pdf-image:*:*:*:*:*:node.js:*:* |
27 Mar 2026, 05:16
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-94 | |
| Summary |
|
25 Mar 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-25 15:16
Updated : 2026-04-02 20:13
NVD link : CVE-2026-26830
Mitre link : CVE-2026-26830
CVE.ORG link : CVE-2026-26830
JSON object : View
Products Affected
pdf-image_project
- pdf-image
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
