CVE-2026-31898

jsPDF is a library to generate PDFs in JavaScript. Prior to version 4.2.1, user control of arguments of the `createAnnotation` method allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized input to the following method, a user can inject arbitrary PDF objects, such as JavaScript actions, which might trigger when the PDF is opened or interacted with the `createAnnotation`: `color` parameter. The vulnerability has been fixed in jsPDF@4.2.1. As a workaround, sanitize user input before passing it to the vulnerable API members.
Configurations

Configuration 1 (hide)

cpe:2.3:a:parall:jspdf:*:*:*:*:*:node.js:*:*

History

No history.

Information

Published : 2026-03-18 04:17

Updated : 2026-03-20 18:08


NVD link : CVE-2026-31898

Mitre link : CVE-2026-31898

CVE.ORG link : CVE-2026-31898


JSON object : View

Products Affected

parall

  • jspdf
CWE
CWE-116

Improper Encoding or Escaping of Output