Stirling-PDF is a locally hosted web application that allows you to perform various operations on PDF files. In version 2.7.3, the /api/v1/convert/eml/pdf endpoint with parameter downloadHtml=true returns unsanitized HTML from the email body with Content-Type: text/html. An attacker who sends a malicious email to a Stirling-PDF user can achieve JavaScript execution when that user exports the email using the "Download HTML intermediate file" feature. Version 2.8.0 fixes the issue.
References
Configurations
No configuration.
History
No history.
Information
Published : 2026-03-26 17:16
Updated : 2026-03-30 13:26
NVD link : CVE-2026-34071
Mitre link : CVE-2026-34071
CVE.ORG link : CVE-2026-34071
JSON object : View
Products Affected
No product.
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
