CVE-2026-26831

textract through 2.5.0 is vulnerable to OS Command Injection via the file path parameter in multiple extractors. When processing files with malicious filenames, the filePath is passed directly to child_process.exec() in lib/extractors/doc.js, rtf.js, dxf.js, images.js, and lib/util.js with inadequate sanitization
Configurations

Configuration 1 (hide)

cpe:2.3:a:dbashford:textract:*:*:*:*:*:node.js:*:*

History

30 Mar 2026, 13:33

Type Values Removed Values Added
CPE cpe:2.3:a:dbashford:textract:*:*:*:*:*:node.js:*:*
First Time Dbashford textract
Dbashford
CWE CWE-78
References () https://github.com/dbashford/textract - () https://github.com/dbashford/textract - Product
References () https://github.com/dbashford/textract/blob/master/lib/extractors/doc.js - () https://github.com/dbashford/textract/blob/master/lib/extractors/doc.js - Product
References () https://github.com/dbashford/textract/blob/master/lib/extractors/rtf.js - () https://github.com/dbashford/textract/blob/master/lib/extractors/rtf.js - Product
References () https://github.com/dbashford/textract/blob/master/lib/util.js - () https://github.com/dbashford/textract/blob/master/lib/util.js - Product
References () https://github.com/zebbernCVE/CVE-2026-26831 - () https://github.com/zebbernCVE/CVE-2026-26831 - Exploit, Third Party Advisory
References () https://www.npmjs.com/package/textract - () https://www.npmjs.com/package/textract - Product

Information

Published : 2026-03-25 16:16

Updated : 2026-03-30 13:33


NVD link : CVE-2026-26831

Mitre link : CVE-2026-26831

CVE.ORG link : CVE-2026-26831


JSON object : View

Products Affected

dbashford

  • textract
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-94

Improper Control of Generation of Code ('Code Injection')