Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24043: CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in parallax jsPDF

0
Medium
VulnerabilityCVE-2026-24043cvecve-2026-24043cwe-74
Published: Mon Feb 02 2026 (02/02/2026, 20:34:50 UTC)
Source: CVE Database V5
Vendor/Project: parallax
Product: jsPDF

Description

CVE-2026-24043 is a medium severity vulnerability in the jsPDF JavaScript library versions prior to 4. 1. 0. It allows an attacker to inject arbitrary XML into the XMP metadata of generated PDFs via unsanitized input to the addMetadata function. This injection can compromise the integrity of PDFs, especially if they are signed or processed later. The vulnerability requires no authentication or user interaction and can be exploited remotely. The issue has been fixed in jsPDF version 4. 1. 0. European organizations using vulnerable jsPDF versions in their web applications or services that generate PDFs should update promptly to prevent potential integrity issues.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/10/2026, 11:10:38 UTC

Technical Analysis

CVE-2026-24043 is an injection vulnerability classified under CWE-74 affecting the parallax jsPDF library, a popular JavaScript tool for generating PDF documents client-side or server-side. The flaw exists in versions prior to 4.1.0, where the first argument of the addMetadata function is not properly sanitized before being embedded as XMP metadata in the generated PDF. This allows an attacker who can control this input to inject arbitrary XML content into the PDF's metadata section. Since XMP metadata can be used for document signing, storage, or further processing, the injection undermines the integrity guarantees of the PDF. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk profile. The CVSS 4.0 score of 6.9 reflects a medium severity, considering the impact on integrity and ease of exploitation. No known exploits have been reported in the wild, but the vulnerability is significant for environments that rely on jsPDF for secure PDF generation. The issue was addressed in jsPDF version 4.1.0 by implementing proper input neutralization and sanitization in the addMetadata function to prevent XML injection.

Potential Impact

For European organizations, this vulnerability poses a risk to the integrity of PDF documents generated using vulnerable jsPDF versions. This is particularly critical for sectors that rely on digitally signed PDFs for legal, financial, or regulatory compliance purposes, such as banking, government, healthcare, and legal services. An attacker injecting malicious XML metadata could cause signature validation failures or introduce misleading metadata, potentially leading to document repudiation or manipulation. This undermines trust in document authenticity and could disrupt workflows dependent on automated PDF processing or archiving. Since jsPDF is widely used in web applications and client-side PDF generation, organizations embedding this library without proper updates may inadvertently expose themselves to integrity attacks. Although no confidentiality or availability impact is directly indicated, the loss of integrity in signed documents can have severe operational and reputational consequences.

Mitigation Recommendations

The primary mitigation is to upgrade all instances of jsPDF to version 4.1.0 or later, where the vulnerability has been fixed. Organizations should audit their codebases and dependencies to identify usage of vulnerable jsPDF versions, especially in web applications or services that generate PDFs. Additionally, implement strict input validation and sanitization on any data passed to the addMetadata function to prevent injection of malicious XML content. Employ security code reviews and automated scanning tools to detect unsafe usage patterns. For critical environments, consider implementing PDF integrity verification processes post-generation to detect anomalies in metadata. Educate developers about secure handling of third-party libraries and the risks of unsanitized input in document generation contexts. Finally, monitor security advisories for any emerging exploits related to this vulnerability and apply patches promptly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-20T22:30:11.777Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69813005f9fa50a62f63a3d6

Added to database: 2/2/2026, 11:15:17 PM

Last enriched: 2/10/2026, 11:10:38 AM

Last updated: 3/24/2026, 7:05:51 AM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses