jsPDF is a library to generate PDFs in JavaScript. Prior to version 4.2.1, user control of arguments of the `createAnnotation` method allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized input to the following method, a user can inject arbitrary PDF objects, such as JavaScript actions, which might trigger when the PDF is opened or interacted with the `createAnnotation`: `color` parameter. The vulnerability has been fixed in jsPDF@4.2.1. As a workaround, sanitize user input before passing it to the vulnerable API members.
References
Configurations
History
20 Mar 2026, 18:08
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/parallax/jsPDF/blob/b1607a9391d4cd65ea7ade25998aea8345ae1be3/src/modules/annotations.js#L193-L208 - Patch | |
| References | () https://github.com/parallax/jsPDF/commit/4155c4819d5eca284168e51e0e1e81126b4f14b8 - Patch | |
| References | () https://github.com/parallax/jsPDF/releases/tag/v4.2.1 - Release Notes | |
| References | () https://github.com/parallax/jsPDF/security/advisories/GHSA-7x6v-j9x4-qf24 - Mitigation, Vendor Advisory | |
| CPE | cpe:2.3:a:parall:jspdf:*:*:*:*:*:node.js:*:* | |
| First Time |
Parall
Parall jspdf |
18 Mar 2026, 14:52
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
18 Mar 2026, 04:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-18 04:17
Updated : 2026-03-20 18:08
NVD link : CVE-2026-31898
Mitre link : CVE-2026-31898
CVE.ORG link : CVE-2026-31898
JSON object : View
Products Affected
parall
- jspdf
CWE
CWE-116
Improper Encoding or Escaping of Output
