Bug 2448547 (CVE-2026-31898) - CVE-2026-31898 jspdf: jsPDF: Arbitrary code execution via unsanitized input in createAnnotation method
Summary: CVE-2026-31898 jspdf: jsPDF: Arbitrary code execution via unsanitized input i...
Keywords:
Status: NEW
Alias: CVE-2026-31898
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-03-18 04:04 UTC by OSIDB Bzimport
Modified: 2026-03-18 23:13 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-03-18 04:04:22 UTC
jsPDF is a library to generate PDFs in JavaScript. Prior to version 4.2.1, user control of arguments of the `createAnnotation` method allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized input to the following method, a user can inject arbitrary PDF objects, such as JavaScript actions, which might trigger when the PDF is opened or interacted with the `createAnnotation`: `color` parameter. The vulnerability has been fixed in jsPDF.1. As a workaround, sanitize user input before passing it to the vulnerable API members.


Note You need to log in before you can comment on or make changes to this bug.