CVE-2026-24133: CWE-770: Allocation of Resources Without Limits or Throttling in parallax jsPDF
jsPDF is a library to generate PDFs in JavaScript. Prior to 4.1.0, user control of the first argument of the addImage method results in denial of service. If given the possibility to pass unsanitized image data or URLs to the addImage method, a user can provide a harmful BMP file that results in out of memory errors and denial of service. Harmful BMP files have large width and/or height entries in their headers, which lead to excessive memory allocation. The html method is also affected. The vulnerability has been fixed in jsPDF@4.1.0.
AI Analysis
Technical Summary
CVE-2026-24133 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) found in the parallax jsPDF library, a widely used JavaScript tool for generating PDF documents client-side. The flaw exists in versions prior to 4.1.0 within the addImage and html methods, which accept image data or URLs as input. An attacker can exploit this by providing a malicious BMP image file with header fields specifying extremely large width and/or height values. When jsPDF processes such an image, it attempts to allocate memory proportional to these dimensions without any limit or throttling, leading to excessive memory consumption. This results in out-of-memory errors that cause the application or service to crash or become unresponsive, effectively causing a denial of service (DoS). The vulnerability requires no authentication or user interaction, making it remotely exploitable over the network if the application processes untrusted image inputs. The issue was publicly disclosed and assigned CVE-2026-24133 with a CVSS 4.0 base score of 8.7, indicating high severity. The fix was implemented in jsPDF version 4.1.0 by adding proper input validation and resource allocation limits to prevent memory exhaustion. No known exploits are currently reported in the wild, but the vulnerability poses a significant risk to any web applications or services that incorporate vulnerable jsPDF versions and accept user-supplied images for PDF generation.
Potential Impact
For European organizations, the primary impact of this vulnerability is denial of service, which can disrupt business operations, degrade user experience, and potentially cause downtime in web applications or services that generate PDFs from user-supplied images. Organizations in sectors such as finance, government, healthcare, and e-commerce that rely on jsPDF for document generation may face service interruptions or reputational damage if exploited. Since the vulnerability does not require authentication or user interaction, it can be triggered remotely by attackers submitting crafted BMP images, increasing the risk of automated or large-scale attacks. Additionally, denial of service conditions could be leveraged as part of multi-stage attacks to distract or exhaust incident response resources. The vulnerability does not directly lead to data breaches or code execution but impacts availability, a critical security dimension under GDPR and other European data protection regulations. Organizations may also face compliance risks if service disruptions affect critical customer-facing or internal systems.
Mitigation Recommendations
The most effective mitigation is to upgrade all instances of jsPDF to version 4.1.0 or later, where the vulnerability is fixed. Organizations should audit their codebases and dependencies to identify and update vulnerable jsPDF versions promptly. Additionally, implement strict input validation and sanitization for all image data and URLs accepted by the addImage and html methods to reject suspicious or malformed BMP files with abnormally large dimensions. Employ application-layer rate limiting and resource usage monitoring to detect and block abnormal memory consumption patterns. Consider sandboxing or isolating PDF generation processes to contain potential denial of service impacts. Regularly monitor vulnerability advisories and maintain an inventory of third-party libraries to ensure timely patching. For web-facing applications, use web application firewalls (WAFs) with custom rules to detect and block malicious image payloads targeting this vulnerability. Finally, conduct security testing and fuzzing focused on image processing components to uncover similar resource exhaustion issues.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2026-24133: CWE-770: Allocation of Resources Without Limits or Throttling in parallax jsPDF
Description
jsPDF is a library to generate PDFs in JavaScript. Prior to 4.1.0, user control of the first argument of the addImage method results in denial of service. If given the possibility to pass unsanitized image data or URLs to the addImage method, a user can provide a harmful BMP file that results in out of memory errors and denial of service. Harmful BMP files have large width and/or height entries in their headers, which lead to excessive memory allocation. The html method is also affected. The vulnerability has been fixed in jsPDF@4.1.0.
AI-Powered Analysis
Technical Analysis
CVE-2026-24133 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) found in the parallax jsPDF library, a widely used JavaScript tool for generating PDF documents client-side. The flaw exists in versions prior to 4.1.0 within the addImage and html methods, which accept image data or URLs as input. An attacker can exploit this by providing a malicious BMP image file with header fields specifying extremely large width and/or height values. When jsPDF processes such an image, it attempts to allocate memory proportional to these dimensions without any limit or throttling, leading to excessive memory consumption. This results in out-of-memory errors that cause the application or service to crash or become unresponsive, effectively causing a denial of service (DoS). The vulnerability requires no authentication or user interaction, making it remotely exploitable over the network if the application processes untrusted image inputs. The issue was publicly disclosed and assigned CVE-2026-24133 with a CVSS 4.0 base score of 8.7, indicating high severity. The fix was implemented in jsPDF version 4.1.0 by adding proper input validation and resource allocation limits to prevent memory exhaustion. No known exploits are currently reported in the wild, but the vulnerability poses a significant risk to any web applications or services that incorporate vulnerable jsPDF versions and accept user-supplied images for PDF generation.
Potential Impact
For European organizations, the primary impact of this vulnerability is denial of service, which can disrupt business operations, degrade user experience, and potentially cause downtime in web applications or services that generate PDFs from user-supplied images. Organizations in sectors such as finance, government, healthcare, and e-commerce that rely on jsPDF for document generation may face service interruptions or reputational damage if exploited. Since the vulnerability does not require authentication or user interaction, it can be triggered remotely by attackers submitting crafted BMP images, increasing the risk of automated or large-scale attacks. Additionally, denial of service conditions could be leveraged as part of multi-stage attacks to distract or exhaust incident response resources. The vulnerability does not directly lead to data breaches or code execution but impacts availability, a critical security dimension under GDPR and other European data protection regulations. Organizations may also face compliance risks if service disruptions affect critical customer-facing or internal systems.
Mitigation Recommendations
The most effective mitigation is to upgrade all instances of jsPDF to version 4.1.0 or later, where the vulnerability is fixed. Organizations should audit their codebases and dependencies to identify and update vulnerable jsPDF versions promptly. Additionally, implement strict input validation and sanitization for all image data and URLs accepted by the addImage and html methods to reject suspicious or malformed BMP files with abnormally large dimensions. Employ application-layer rate limiting and resource usage monitoring to detect and block abnormal memory consumption patterns. Consider sandboxing or isolating PDF generation processes to contain potential denial of service impacts. Regularly monitor vulnerability advisories and maintain an inventory of third-party libraries to ensure timely patching. For web-facing applications, use web application firewalls (WAFs) with custom rules to detect and block malicious image payloads targeting this vulnerability. Finally, conduct security testing and fuzzing focused on image processing components to uncover similar resource exhaustion issues.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-21T18:38:22.474Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69813005f9fa50a62f63a3df
Added to database: 2/2/2026, 11:15:17 PM
Last enriched: 2/2/2026, 11:30:39 PM
Last updated: 2/7/2026, 1:42:32 AM
Views: 43
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2071: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.