CVE-2026-31898

jsPDF is a library to generate PDFs in JavaScript. Prior to version 4.2.1, user control of arguments of the `createAnnotation` method allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized input to the following method, a user can inject arbitrary PDF objects, such as JavaScript actions, which might trigger when the PDF is opened or interacted with the `createAnnotation`: `color` parameter. The vulnerability has been fixed in jsPDF@4.2.1. As a workaround, sanitize user input before passing it to the vulnerable API members.
Configurations

Configuration 1 (hide)

cpe:2.3:a:parall:jspdf:*:*:*:*:*:node.js:*:*

History

20 Mar 2026, 18:08

Type Values Removed Values Added
References () https://github.com/parallax/jsPDF/blob/b1607a9391d4cd65ea7ade25998aea8345ae1be3/src/modules/annotations.js#L193-L208 - () https://github.com/parallax/jsPDF/blob/b1607a9391d4cd65ea7ade25998aea8345ae1be3/src/modules/annotations.js#L193-L208 - Patch
References () https://github.com/parallax/jsPDF/commit/4155c4819d5eca284168e51e0e1e81126b4f14b8 - () https://github.com/parallax/jsPDF/commit/4155c4819d5eca284168e51e0e1e81126b4f14b8 - Patch
References () https://github.com/parallax/jsPDF/releases/tag/v4.2.1 - () https://github.com/parallax/jsPDF/releases/tag/v4.2.1 - Release Notes
References () https://github.com/parallax/jsPDF/security/advisories/GHSA-7x6v-j9x4-qf24 - () https://github.com/parallax/jsPDF/security/advisories/GHSA-7x6v-j9x4-qf24 - Mitigation, Vendor Advisory
CPE cpe:2.3:a:parall:jspdf:*:*:*:*:*:node.js:*:*
First Time Parall
Parall jspdf

18 Mar 2026, 14:52

Type Values Removed Values Added
Summary
  • (es) jsPDF es una biblioteca para generar PDFs en JavaScript. Anterior a la versión 4.2.1, el control del usuario sobre los argumentos del método 'createAnnotation' permite a los usuarios inyectar objetos PDF arbitrarios, como acciones de JavaScript. Si se le da la posibilidad de pasar entrada no saneada al siguiente método, un usuario puede inyectar objetos PDF arbitrarios, como acciones de JavaScript, que podrían activarse cuando el PDF se abre o se interactúa con el 'createAnnotation': parámetro 'color'. La vulnerabilidad ha sido corregida en jsPDF@4.2.1. Como solución alternativa, sanee la entrada del usuario antes de pasarla a los miembros vulnerables de la API.

18 Mar 2026, 04:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-18 04:17

Updated : 2026-03-20 18:08


NVD link : CVE-2026-31898

Mitre link : CVE-2026-31898

CVE.ORG link : CVE-2026-31898


JSON object : View

Products Affected

parall

  • jspdf
CWE
CWE-116

Improper Encoding or Escaping of Output