Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24040: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in parallax jsPDF

0
Medium
VulnerabilityCVE-2026-24040cvecve-2026-24040cwe-362
Published: Mon Feb 02 2026 (02/02/2026, 20:38:24 UTC)
Source: CVE Database V5
Vendor/Project: parallax
Product: jsPDF

Description

CVE-2026-24040 is a medium severity race condition vulnerability in the jsPDF library versions prior to 4. 1. 0. The issue arises from improper synchronization of a shared variable used to store JavaScript content during PDF generation in concurrent Node. js environments. This flaw can cause cross-user data leakage, where PDF documents generated for one user may inadvertently include JavaScript payloads intended for another user, exposing sensitive information. The vulnerability primarily affects server-side usage of jsPDF but could also manifest in client-side scenarios under concurrent execution. Exploitation requires no authentication or user interaction but depends on concurrent PDF generation requests. The vulnerability has been fixed in jsPDF version 4. 1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/10/2026, 11:10:23 UTC

Technical Analysis

CVE-2026-24040 is a concurrency-related vulnerability classified under CWE-362 (Race Condition) affecting the jsPDF library, a popular JavaScript tool for generating PDF documents. Prior to version 4.1.0, the addJS method in the Node.js build of jsPDF uses a shared module-scoped variable named 'text' to hold JavaScript content intended for embedding in PDFs. In environments where multiple PDF generation requests occur simultaneously—common in Node.js web servers—this shared variable is accessed and modified concurrently without proper synchronization. As a result, the JavaScript content meant for one user's PDF can be overwritten by another user's request before the document is finalized. This leads to cross-user data leakage, where sensitive JavaScript payloads or embedded data from one user are exposed in another user's PDF document. Although primarily a server-side issue, similar race conditions could theoretically occur in client-side usage if concurrent execution contexts exist. The vulnerability does not require authentication or user interaction, making it easier to exploit in multi-tenant or shared server environments. The CVSS 4.0 base score is 6.3 (medium severity), reflecting network attack vector, low complexity, no privileges required, and partial confidentiality and integrity impact. The flaw was addressed in jsPDF version 4.1.0 by eliminating the shared mutable state and ensuring thread-safe handling of JavaScript content during PDF generation.

Potential Impact

For European organizations, this vulnerability poses a risk of sensitive data exposure through inadvertent cross-user leakage in dynamically generated PDFs. Industries such as finance, healthcare, legal, and government that rely on server-side PDF generation with jsPDF in multi-user environments could face confidentiality breaches, potentially violating GDPR and other data protection regulations. The integrity of generated documents is also compromised, undermining trust in document authenticity. Although availability is not directly impacted, reputational damage and regulatory penalties could result from data leakage incidents. Organizations using vulnerable jsPDF versions in high-concurrency Node.js applications, especially those serving multiple clients or tenants, are at heightened risk. Attackers could exploit this flaw to access sensitive information without authentication, increasing the threat landscape. The impact is amplified in environments where PDFs contain embedded scripts or confidential data, making mitigation critical to maintain compliance and data security.

Mitigation Recommendations

The primary mitigation is to upgrade all jsPDF instances to version 4.1.0 or later, where the race condition has been fixed by removing shared mutable state and implementing proper synchronization. Organizations should audit their Node.js applications to identify usage of vulnerable jsPDF versions, particularly in multi-tenant or concurrent request scenarios. Implementing request-level isolation for PDF generation processes can further reduce risk by preventing shared state across requests. Where upgrading is not immediately feasible, consider serializing PDF generation requests or using separate process instances to avoid concurrent access to shared variables. Conduct thorough testing to ensure no residual race conditions exist in custom PDF generation code. Additionally, review embedded JavaScript usage in PDFs to minimize sensitive data exposure and consider disabling JavaScript in PDFs if not required. Monitoring and logging PDF generation activities can help detect anomalous behavior indicative of exploitation attempts. Finally, ensure compliance with data protection laws by promptly addressing this vulnerability to prevent unauthorized data disclosure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-20T22:30:11.777Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69813005f9fa50a62f63a3d1

Added to database: 2/2/2026, 11:15:17 PM

Last enriched: 2/10/2026, 11:10:23 AM

Last updated: 3/24/2026, 12:19:29 AM

Views: 112

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses