Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11362: Allocation of Resources Without Limits or Throttling in pdfmake

0
High
VulnerabilityCVE-2025-11362cvecve-2025-11362
Published: Tue Oct 07 2025 (10/07/2025, 05:00:04 UTC)
Source: CVE Database V5
Product: pdfmake

Description

Versions of the package pdfmake before 0.3.0-beta.17 are vulnerable to Allocation of Resources Without Limits or Throttling via repeatedly redirect URL in file embedding. An attacker can cause the application to crash or become unresponsive by providing crafted input that triggers this condition.

AI-Powered Analysis

AILast updated: 10/14/2025, 05:45:08 UTC

Technical Analysis

CVE-2025-11362 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting the pdfmake package, specifically versions before 0.3.0-beta.17. Pdfmake is a widely used JavaScript library for generating PDF documents in web applications. The vulnerability arises from the way pdfmake handles file embedding, particularly when URLs are repeatedly redirected. An attacker can craft input that triggers continuous resource allocation without any throttling or limits, leading to excessive memory or CPU consumption. This can cause the application to crash or become unresponsive, effectively resulting in a denial-of-service (DoS) condition. The CVSS 4.0 vector indicates that the attack can be performed remotely (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and no authentication (AT:N). The vulnerability impacts availability heavily (VA:H) but does not affect confidentiality or integrity. No known exploits are currently in the wild, but the high severity and ease of exploitation make it a critical concern for applications relying on pdfmake for PDF generation. The lack of patch links suggests that users must upgrade to the fixed version 0.3.0-beta.17 once available or apply vendor-recommended mitigations.

Potential Impact

For European organizations, the primary impact is on service availability. Applications that dynamically generate PDFs using vulnerable pdfmake versions can be targeted to cause denial-of-service, disrupting business operations, customer-facing services, or internal workflows. This can lead to downtime, loss of productivity, and potential reputational damage. Industries relying heavily on document generation, such as finance, legal, healthcare, and government services, may experience significant operational impact. Additionally, resource exhaustion attacks can increase infrastructure costs due to overconsumption of CPU and memory. While confidentiality and integrity are not directly impacted, the disruption of critical services can indirectly affect compliance with regulations such as GDPR if service availability is compromised. The absence of required authentication or user interaction means attackers can exploit this vulnerability at scale, increasing the risk for organizations with exposed PDF generation endpoints.

Mitigation Recommendations

1. Upgrade pdfmake to version 0.3.0-beta.17 or later as soon as it becomes available to ensure the vulnerability is patched. 2. Implement strict input validation on all file embedding inputs to prevent maliciously crafted URLs that trigger repeated redirects. 3. Apply rate limiting and throttling mechanisms on PDF generation endpoints to limit the number of requests and resource consumption per user or IP address. 4. Monitor application logs and resource usage metrics for unusual spikes in CPU or memory consumption related to PDF generation processes. 5. Use web application firewalls (WAFs) to detect and block suspicious patterns of repeated URL redirects or excessive PDF generation requests. 6. Isolate PDF generation services in separate containers or environments with resource quotas to contain potential denial-of-service impacts. 7. Educate development teams about secure usage of third-party libraries and the importance of timely patching.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
snyk
Date Reserved
2025-10-06T11:52:09.777Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e4a2b8a0f5db0db2785ab7

Added to database: 10/7/2025, 5:18:48 AM

Last enriched: 10/14/2025, 5:45:08 AM

Last updated: 11/20/2025, 3:47:11 PM

Views: 323

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats