Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24133: CWE-770: Allocation of Resources Without Limits or Throttling in parallax jsPDF

0
High
VulnerabilityCVE-2026-24133cvecve-2026-24133cwe-770
Published: Mon Feb 02 2026 (02/02/2026, 20:32:37 UTC)
Source: CVE Database V5
Vendor/Project: parallax
Product: jsPDF

Description

CVE-2026-24133 is a high-severity vulnerability in jsPDF versions prior to 4. 1. 0, caused by improper resource allocation when processing user-supplied image data via the addImage and html methods. Attackers can supply malicious BMP files with extremely large dimensions, leading to excessive memory allocation and resulting in denial of service (DoS) through out-of-memory errors. This vulnerability requires no authentication or user interaction and can be exploited remotely via network access. The issue has been fixed in jsPDF version 4. 1. 0. European organizations using vulnerable jsPDF versions in web applications or services that accept user-generated PDFs are at risk of service disruption. Mitigation involves upgrading to jsPDF 4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/10/2026, 11:12:22 UTC

Technical Analysis

CVE-2026-24133 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting the parallax jsPDF library versions prior to 4.1.0. jsPDF is a widely used JavaScript library for generating PDF documents client-side or server-side. The vulnerability arises from insufficient validation of the first argument passed to the addImage method and the html method, which can accept image data or URLs. Specifically, if an attacker can supply a malicious BMP image with extremely large width and/or height values in the header, the library attempts to allocate memory proportional to these dimensions without any upper limit or throttling. This leads to excessive memory consumption, causing out-of-memory errors and effectively denying service to legitimate users. The vulnerability does not require any privileges, authentication, or user interaction, and can be triggered remotely if the application processes untrusted image inputs. The issue was publicly disclosed and fixed in jsPDF version 4.1.0. No known exploits are currently reported in the wild, but the high CVSS score of 8.7 reflects the potential impact and ease of exploitation. The vulnerability primarily affects web applications and services that use vulnerable jsPDF versions to generate PDFs from user-supplied content, especially those that allow embedding images without proper sanitization or size validation.

Potential Impact

For European organizations, this vulnerability poses a significant risk of denial of service attacks that can disrupt business operations, particularly for companies relying on jsPDF for PDF generation in customer-facing web applications, document management systems, or automated reporting tools. The DoS can lead to service outages, degraded user experience, and potential financial losses. Organizations in sectors such as finance, legal, government, and software development, which often generate PDFs dynamically, are particularly vulnerable. Additionally, the disruption could be exploited as a vector for more complex attacks by causing system instability or diverting attention from other malicious activities. Given the vulnerability requires no authentication or user interaction, it increases the attack surface, especially for public-facing applications. The lack of current known exploits provides a window for proactive mitigation before widespread exploitation occurs.

Mitigation Recommendations

1. Upgrade all instances of jsPDF to version 4.1.0 or later immediately to ensure the vulnerability is patched. 2. Implement strict input validation and sanitization for all image data and URLs passed to the addImage and html methods, enforcing maximum allowed dimensions and rejecting suspicious BMP files. 3. Employ runtime monitoring and resource usage limits on services generating PDFs to detect and mitigate abnormal memory consumption patterns. 4. If upgrading is not immediately feasible, consider disabling or restricting functionality that accepts user-supplied images or HTML content for PDF generation. 5. Conduct code reviews and security testing focused on third-party library usage, especially for components handling untrusted inputs. 6. Educate developers about the risks of resource exhaustion vulnerabilities and best practices for secure PDF generation. 7. Monitor security advisories for any emerging exploits related to this vulnerability and apply patches promptly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-21T18:38:22.474Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69813005f9fa50a62f63a3df

Added to database: 2/2/2026, 11:15:17 PM

Last enriched: 2/10/2026, 11:12:22 AM

Last updated: 3/23/2026, 10:50:09 PM

Views: 88

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses