CVE-2025-68428: CWE-35: Path Traversal: '.../...//' in parallax jsPDF
jsPDF is a library to generate PDFs in JavaScript. Prior to version 4.0.0, user control of the first argument of the loadFile method in the node.js build allows local file inclusion/path traversal. If given the possibility to pass unsanitized paths to the loadFile method, a user can retrieve file contents of arbitrary files in the local file system the node process is running in. The file contents are included verbatim in the generated PDFs. Other affected methods are `addImage`, `html`, and `addFont`. Only the node.js builds of the library are affected, namely the `dist/jspdf.node.js` and `dist/jspdf.node.min.js` files. The vulnerability has been fixed in jsPDF@4.0.0. This version restricts file system access per default. This semver-major update does not introduce other breaking changes. Some workarounds areavailable. With recent node versions, jsPDF recommends using the `--permission` flag in production. The feature was introduced experimentally in v20.0.0 and is stable since v22.13.0/v23.5.0/v24.0.0. For older node versions, sanitize user-provided paths before passing them to jsPDF.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-68428 affects the jsPDF library, a popular JavaScript tool used to generate PDFs. Specifically, the Node.js builds of jsPDF (dist/jspdf.node.js and dist/jspdf.node.min.js) prior to version 4.0.0 allow user-controlled input to the loadFile method and other methods like addImage, html, and addFont without proper sanitization. This flaw enables path traversal attacks (CWE-35) and local file inclusion (CWE-73), whereby an attacker can manipulate the file path argument to access arbitrary files on the server's filesystem. The contents of these files are then embedded directly into generated PDFs, potentially leaking sensitive information. The vulnerability is remotely exploitable without authentication or user interaction, with a CVSS 4.0 score of 9.2 indicating critical severity. The root cause lies in insufficient validation of file paths, allowing sequences like '.../...//' to traverse directories. The issue was addressed in jsPDF 4.0.0 by restricting filesystem access by default and recommending the use of Node.js's --permission flag in production environments to limit file access. For older Node.js versions, manual sanitization of user inputs is advised. No known exploits are currently reported in the wild, but the high severity and ease of exploitation make this a significant threat for applications using vulnerable jsPDF versions in Node.js contexts.
Potential Impact
For European organizations, this vulnerability poses a serious risk of unauthorized disclosure of sensitive local files, including configuration files, credentials, or proprietary data, if they use vulnerable jsPDF versions in their Node.js applications. The ability to include arbitrary file contents in generated PDFs can lead to data breaches, intellectual property theft, and compliance violations under GDPR and other data protection regulations. Since exploitation requires no authentication or user interaction, attackers can remotely target exposed services or APIs that utilize jsPDF's vulnerable methods. This could impact sectors with heavy use of PDF generation in backend services, such as finance, healthcare, government, and software development. The compromise of internal files could also facilitate further attacks, such as privilege escalation or lateral movement within networks. The critical severity and network attack vector underline the urgency for European entities to remediate swiftly to avoid reputational damage and regulatory penalties.
Mitigation Recommendations
European organizations should immediately upgrade all Node.js applications using jsPDF to version 4.0.0 or later, which enforces filesystem access restrictions by default. Where upgrading is not immediately feasible, developers must implement rigorous sanitization of all user-supplied file path inputs to prevent path traversal sequences. Employing Node.js's --permission flag (available since Node v20.0.0 and stable in v22.13.0+) in production environments can further restrict file system access and reduce risk. Additionally, organizations should audit their codebases and dependencies to identify any usage of vulnerable jsPDF versions and isolate or restrict access to affected services. Implementing runtime application self-protection (RASP) or file integrity monitoring can help detect exploitation attempts. Finally, monitoring logs for suspicious file access patterns and educating developers about secure file handling practices will strengthen defenses against similar vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-68428: CWE-35: Path Traversal: '.../...//' in parallax jsPDF
Description
jsPDF is a library to generate PDFs in JavaScript. Prior to version 4.0.0, user control of the first argument of the loadFile method in the node.js build allows local file inclusion/path traversal. If given the possibility to pass unsanitized paths to the loadFile method, a user can retrieve file contents of arbitrary files in the local file system the node process is running in. The file contents are included verbatim in the generated PDFs. Other affected methods are `addImage`, `html`, and `addFont`. Only the node.js builds of the library are affected, namely the `dist/jspdf.node.js` and `dist/jspdf.node.min.js` files. The vulnerability has been fixed in jsPDF@4.0.0. This version restricts file system access per default. This semver-major update does not introduce other breaking changes. Some workarounds areavailable. With recent node versions, jsPDF recommends using the `--permission` flag in production. The feature was introduced experimentally in v20.0.0 and is stable since v22.13.0/v23.5.0/v24.0.0. For older node versions, sanitize user-provided paths before passing them to jsPDF.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-68428 affects the jsPDF library, a popular JavaScript tool used to generate PDFs. Specifically, the Node.js builds of jsPDF (dist/jspdf.node.js and dist/jspdf.node.min.js) prior to version 4.0.0 allow user-controlled input to the loadFile method and other methods like addImage, html, and addFont without proper sanitization. This flaw enables path traversal attacks (CWE-35) and local file inclusion (CWE-73), whereby an attacker can manipulate the file path argument to access arbitrary files on the server's filesystem. The contents of these files are then embedded directly into generated PDFs, potentially leaking sensitive information. The vulnerability is remotely exploitable without authentication or user interaction, with a CVSS 4.0 score of 9.2 indicating critical severity. The root cause lies in insufficient validation of file paths, allowing sequences like '.../...//' to traverse directories. The issue was addressed in jsPDF 4.0.0 by restricting filesystem access by default and recommending the use of Node.js's --permission flag in production environments to limit file access. For older Node.js versions, manual sanitization of user inputs is advised. No known exploits are currently reported in the wild, but the high severity and ease of exploitation make this a significant threat for applications using vulnerable jsPDF versions in Node.js contexts.
Potential Impact
For European organizations, this vulnerability poses a serious risk of unauthorized disclosure of sensitive local files, including configuration files, credentials, or proprietary data, if they use vulnerable jsPDF versions in their Node.js applications. The ability to include arbitrary file contents in generated PDFs can lead to data breaches, intellectual property theft, and compliance violations under GDPR and other data protection regulations. Since exploitation requires no authentication or user interaction, attackers can remotely target exposed services or APIs that utilize jsPDF's vulnerable methods. This could impact sectors with heavy use of PDF generation in backend services, such as finance, healthcare, government, and software development. The compromise of internal files could also facilitate further attacks, such as privilege escalation or lateral movement within networks. The critical severity and network attack vector underline the urgency for European entities to remediate swiftly to avoid reputational damage and regulatory penalties.
Mitigation Recommendations
European organizations should immediately upgrade all Node.js applications using jsPDF to version 4.0.0 or later, which enforces filesystem access restrictions by default. Where upgrading is not immediately feasible, developers must implement rigorous sanitization of all user-supplied file path inputs to prevent path traversal sequences. Employing Node.js's --permission flag (available since Node v20.0.0 and stable in v22.13.0+) in production environments can further restrict file system access and reduce risk. Additionally, organizations should audit their codebases and dependencies to identify any usage of vulnerable jsPDF versions and isolate or restrict access to affected services. Implementing runtime application self-protection (RASP) or file integrity monitoring can help detect exploitation attempts. Finally, monitoring logs for suspicious file access patterns and educating developers about secure file handling practices will strengthen defenses against similar vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-17T15:29:39.378Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695c32b23839e4417593972b
Added to database: 1/5/2026, 9:52:50 PM
Last enriched: 1/5/2026, 10:07:10 PM
Last updated: 1/8/2026, 1:56:25 PM
Views: 98
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Critical Vulnerability Exposes n8n Instances to Takeover Attacks
CriticalCritical Vulnerability Patched in jsPDF
CriticalCVE-2026-0719: Stack-based Buffer Overflow in Red Hat Red Hat Enterprise Linux 10
HighCVE-2025-69260: CWE-346: Origin Validation Error in Trend Micro, Inc. Trend Micro Apex Central
HighCVE-2025-69259: CWE-346: Origin Validation Error in Trend Micro, Inc. Trend Micro Apex Central
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.