Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68428: CWE-35: Path Traversal: '.../...//' in parallax jsPDF

0
Critical
VulnerabilityCVE-2025-68428cvecve-2025-68428cwe-35cwe-73
Published: Mon Jan 05 2026 (01/05/2026, 21:43:55 UTC)
Source: CVE Database V5
Vendor/Project: parallax
Product: jsPDF

Description

jsPDF is a library to generate PDFs in JavaScript. Prior to version 4.0.0, user control of the first argument of the loadFile method in the node.js build allows local file inclusion/path traversal. If given the possibility to pass unsanitized paths to the loadFile method, a user can retrieve file contents of arbitrary files in the local file system the node process is running in. The file contents are included verbatim in the generated PDFs. Other affected methods are `addImage`, `html`, and `addFont`. Only the node.js builds of the library are affected, namely the `dist/jspdf.node.js` and `dist/jspdf.node.min.js` files. The vulnerability has been fixed in jsPDF@4.0.0. This version restricts file system access per default. This semver-major update does not introduce other breaking changes. Some workarounds areavailable. With recent node versions, jsPDF recommends using the `--permission` flag in production. The feature was introduced experimentally in v20.0.0 and is stable since v22.13.0/v23.5.0/v24.0.0. For older node versions, sanitize user-provided paths before passing them to jsPDF.

AI-Powered Analysis

AILast updated: 01/05/2026, 22:07:10 UTC

Technical Analysis

The vulnerability identified as CVE-2025-68428 affects the jsPDF library, a popular JavaScript tool used to generate PDFs. Specifically, the Node.js builds of jsPDF (dist/jspdf.node.js and dist/jspdf.node.min.js) prior to version 4.0.0 allow user-controlled input to the loadFile method and other methods like addImage, html, and addFont without proper sanitization. This flaw enables path traversal attacks (CWE-35) and local file inclusion (CWE-73), whereby an attacker can manipulate the file path argument to access arbitrary files on the server's filesystem. The contents of these files are then embedded directly into generated PDFs, potentially leaking sensitive information. The vulnerability is remotely exploitable without authentication or user interaction, with a CVSS 4.0 score of 9.2 indicating critical severity. The root cause lies in insufficient validation of file paths, allowing sequences like '.../...//' to traverse directories. The issue was addressed in jsPDF 4.0.0 by restricting filesystem access by default and recommending the use of Node.js's --permission flag in production environments to limit file access. For older Node.js versions, manual sanitization of user inputs is advised. No known exploits are currently reported in the wild, but the high severity and ease of exploitation make this a significant threat for applications using vulnerable jsPDF versions in Node.js contexts.

Potential Impact

For European organizations, this vulnerability poses a serious risk of unauthorized disclosure of sensitive local files, including configuration files, credentials, or proprietary data, if they use vulnerable jsPDF versions in their Node.js applications. The ability to include arbitrary file contents in generated PDFs can lead to data breaches, intellectual property theft, and compliance violations under GDPR and other data protection regulations. Since exploitation requires no authentication or user interaction, attackers can remotely target exposed services or APIs that utilize jsPDF's vulnerable methods. This could impact sectors with heavy use of PDF generation in backend services, such as finance, healthcare, government, and software development. The compromise of internal files could also facilitate further attacks, such as privilege escalation or lateral movement within networks. The critical severity and network attack vector underline the urgency for European entities to remediate swiftly to avoid reputational damage and regulatory penalties.

Mitigation Recommendations

European organizations should immediately upgrade all Node.js applications using jsPDF to version 4.0.0 or later, which enforces filesystem access restrictions by default. Where upgrading is not immediately feasible, developers must implement rigorous sanitization of all user-supplied file path inputs to prevent path traversal sequences. Employing Node.js's --permission flag (available since Node v20.0.0 and stable in v22.13.0+) in production environments can further restrict file system access and reduce risk. Additionally, organizations should audit their codebases and dependencies to identify any usage of vulnerable jsPDF versions and isolate or restrict access to affected services. Implementing runtime application self-protection (RASP) or file integrity monitoring can help detect exploitation attempts. Finally, monitoring logs for suspicious file access patterns and educating developers about secure file handling practices will strengthen defenses against similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-17T15:29:39.378Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695c32b23839e4417593972b

Added to database: 1/5/2026, 9:52:50 PM

Last enriched: 1/5/2026, 10:07:10 PM

Last updated: 1/8/2026, 1:56:25 PM

Views: 98

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats