jsPDF is a library to generate PDFs in JavaScript. Prior to version 4.2.1, user control of arguments of the `createAnnotation` method allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized input to the following method, a user can inject arbitrary PDF objects, such as JavaScript actions, which might trigger when the PDF is opened or interacted with the `createAnnotation`: `color` parameter. The vulnerability has been fixed in jsPDF@4.2.1. As a workaround, sanitize user input before passing it to the vulnerable API members.
References
Configurations
History
No history.
Information
Published : 2026-03-18 04:17
Updated : 2026-03-20 18:08
NVD link : CVE-2026-31898
Mitre link : CVE-2026-31898
CVE.ORG link : CVE-2026-31898
JSON object : View
Products Affected
parall
- jspdf
CWE
CWE-116
Improper Encoding or Escaping of Output
