Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68428: CWE-35: Path Traversal: '.../...//' in parallax jsPDF

0
Critical
VulnerabilityCVE-2025-68428cvecve-2025-68428cwe-35cwe-73
Published: Mon Jan 05 2026 (01/05/2026, 21:43:55 UTC)
Source: CVE Database V5
Vendor/Project: parallax
Product: jsPDF

Description

CVE-2025-68428 is a critical path traversal vulnerability in the node. js builds of the jsPDF library prior to version 4. 0. 0. It allows an attacker to supply unsanitized file paths to methods like loadFile, addImage, html, and addFont, enabling local file inclusion and arbitrary file content disclosure on the host system. Exploitation requires no authentication or user interaction and can lead to significant confidentiality breaches. The vulnerability is fixed in jsPDF 4. 0. 0, which restricts filesystem access by default. Node.

AI-Powered Analysis

AILast updated: 01/13/2026, 01:05:17 UTC

Technical Analysis

The vulnerability identified as CVE-2025-68428 affects the jsPDF library, specifically its node.js builds (dist/jspdf.node.js and dist/jspdf.node.min.js) prior to version 4.0.0. jsPDF is widely used to generate PDF documents in JavaScript environments. The flaw arises because the loadFile method, along with addImage, html, and addFont methods, accepts a file path as its first argument without proper sanitization. This allows an attacker to perform path traversal attacks by injecting sequences like '.../...//' to navigate the filesystem arbitrarily. Consequently, an attacker can cause the node.js process to read and embed contents of arbitrary local files into generated PDFs. Since these methods are used server-side, this can lead to local file inclusion (LFI) vulnerabilities, exposing sensitive files such as configuration files, credentials, or source code. The vulnerability requires no privileges or user interaction, making it trivially exploitable remotely if untrusted input is passed to these methods. The issue was addressed in jsPDF version 4.0.0 by restricting filesystem access by default. Additionally, modern node.js versions support the --permission flag to limit filesystem access, which jsPDF recommends using in production. For environments running older node.js versions, sanitizing user input paths before passing them to jsPDF is critical. No known exploits are currently reported in the wild, but the high CVSS score (9.2) underscores the severity and potential impact of this vulnerability.

Potential Impact

For European organizations, this vulnerability poses a significant risk to confidentiality and data integrity. Organizations that generate PDFs server-side using vulnerable jsPDF versions and accept user-supplied input for file paths are at risk of arbitrary local file disclosure. This can lead to leakage of sensitive internal documents, credentials, or intellectual property. Attackers could leverage this to escalate attacks, pivot within networks, or conduct espionage. The vulnerability does not directly affect availability but can severely compromise trust and compliance, especially under GDPR and other data protection regulations. Industries such as finance, healthcare, government, and technology sectors in Europe that rely on jsPDF in their backend systems are particularly vulnerable. The ease of exploitation without authentication or user interaction increases the threat level. Failure to patch or mitigate could result in regulatory penalties, reputational damage, and operational disruptions.

Mitigation Recommendations

1. Upgrade all jsPDF node.js builds to version 4.0.0 or later immediately to benefit from built-in filesystem access restrictions. 2. For environments where upgrading is not immediately possible, implement strict sanitization of all user-supplied file path inputs before passing them to jsPDF methods like loadFile, addImage, html, and addFont. 3. Utilize modern node.js versions (v20.0.0 and above) and enforce the --permission flag to restrict filesystem access in production environments. 4. Conduct code audits to identify any usage of vulnerable jsPDF methods with user-controlled inputs. 5. Employ runtime monitoring and file integrity checks to detect unusual file access patterns by node.js processes. 6. Isolate PDF generation services in restricted containers or sandboxes to limit filesystem exposure. 7. Educate development teams about secure handling of file paths and the risks of path traversal. 8. Review and update incident response plans to include scenarios involving local file inclusion vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-17T15:29:39.378Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695c32b23839e4417593972b

Added to database: 1/5/2026, 9:52:50 PM

Last enriched: 1/13/2026, 1:05:17 AM

Last updated: 2/7/2026, 4:09:31 AM

Views: 320

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats