CVE-2026-24737: CWE-116: Improper Encoding or Escaping of Output in parallax jsPDF
jsPDF is a library to generate PDFs in JavaScript. Prior to 4.1.0, user control of properties and methods of the Acroform module allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized input to one of the following methods or properties, a user can inject arbitrary PDF objects, such as JavaScript actions, which are executed when the victim opens the document. The vulnerable API members are AcroformChoiceField.addOption, AcroformChoiceField.setOptions, AcroFormCheckBox.appearanceState, and AcroFormRadioButton.appearanceState. The vulnerability has been fixed in jsPDF@4.1.0.
AI Analysis
Technical Summary
CVE-2026-24737 is a vulnerability classified under CWE-116 (Improper Encoding or Escaping of Output) affecting the parallax jsPDF library versions before 4.1.0. jsPDF is widely used to generate PDF documents client-side in JavaScript environments. The vulnerability resides in the Acroform module, which manages interactive form fields within PDFs. Specifically, the methods AcroformChoiceField.addOption, AcroformChoiceField.setOptions, and the properties AcroFormCheckBox.appearanceState and AcroFormRadioButton.appearanceState do not properly sanitize or encode user-supplied input. This flaw allows an attacker to inject arbitrary PDF objects, including JavaScript actions embedded within the PDF. When a victim opens the maliciously crafted PDF, the embedded JavaScript executes, potentially leading to unauthorized actions such as data exfiltration, session hijacking, or further malware deployment. The vulnerability requires no authentication and has a low attack complexity but does require the victim to open the malicious PDF, implying user interaction. The CVSS v3.1 score is 8.1, reflecting high confidentiality and integrity impacts but no availability impact. No known exploits are currently reported in the wild. The issue was publicly disclosed on February 2, 2026, and fixed in jsPDF version 4.1.0. Organizations using vulnerable versions in their web applications or document generation pipelines should prioritize patching and input validation to prevent exploitation.
Potential Impact
For European organizations, the impact of CVE-2026-24737 can be significant, especially for those relying on jsPDF for generating PDFs dynamically in client-facing or internal applications. Exploitation can lead to execution of arbitrary JavaScript within PDF viewers, potentially compromising sensitive data confidentiality and integrity. Attackers could use this vector to deliver payloads that steal credentials, manipulate document content, or pivot within networks. Sectors such as finance, government, healthcare, and legal services, which frequently handle sensitive documents, are particularly at risk. Additionally, organizations involved in software development or SaaS platforms that embed jsPDF may inadvertently distribute malicious PDFs if the vulnerability is exploited. The requirement for user interaction (opening the PDF) means phishing or social engineering campaigns could be used to trigger the attack. While no availability impact is expected, the breach of confidentiality and integrity could result in regulatory penalties under GDPR and damage to organizational reputation.
Mitigation Recommendations
1. Upgrade all instances of jsPDF to version 4.1.0 or later, where the vulnerability is patched. 2. Implement strict input validation and sanitization on all user-supplied data passed to Acroform-related APIs, especially addOption, setOptions, and appearanceState properties. 3. Employ Content Security Policy (CSP) and PDF viewer security settings to restrict or disable JavaScript execution within PDFs where feasible. 4. Educate users and staff about the risks of opening unsolicited or unexpected PDF documents, especially those received via email or untrusted sources. 5. Monitor PDF generation workflows for anomalies or unexpected content injection attempts. 6. For organizations distributing PDFs, consider digitally signing documents to ensure integrity and authenticity. 7. Conduct security reviews and code audits of applications using jsPDF to identify and remediate unsafe usage patterns. 8. Deploy endpoint protection solutions capable of detecting malicious PDF behaviors. These steps go beyond generic patching by focusing on secure coding practices and user awareness to reduce exploitation risk.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2026-24737: CWE-116: Improper Encoding or Escaping of Output in parallax jsPDF
Description
jsPDF is a library to generate PDFs in JavaScript. Prior to 4.1.0, user control of properties and methods of the Acroform module allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized input to one of the following methods or properties, a user can inject arbitrary PDF objects, such as JavaScript actions, which are executed when the victim opens the document. The vulnerable API members are AcroformChoiceField.addOption, AcroformChoiceField.setOptions, AcroFormCheckBox.appearanceState, and AcroFormRadioButton.appearanceState. The vulnerability has been fixed in jsPDF@4.1.0.
AI-Powered Analysis
Technical Analysis
CVE-2026-24737 is a vulnerability classified under CWE-116 (Improper Encoding or Escaping of Output) affecting the parallax jsPDF library versions before 4.1.0. jsPDF is widely used to generate PDF documents client-side in JavaScript environments. The vulnerability resides in the Acroform module, which manages interactive form fields within PDFs. Specifically, the methods AcroformChoiceField.addOption, AcroformChoiceField.setOptions, and the properties AcroFormCheckBox.appearanceState and AcroFormRadioButton.appearanceState do not properly sanitize or encode user-supplied input. This flaw allows an attacker to inject arbitrary PDF objects, including JavaScript actions embedded within the PDF. When a victim opens the maliciously crafted PDF, the embedded JavaScript executes, potentially leading to unauthorized actions such as data exfiltration, session hijacking, or further malware deployment. The vulnerability requires no authentication and has a low attack complexity but does require the victim to open the malicious PDF, implying user interaction. The CVSS v3.1 score is 8.1, reflecting high confidentiality and integrity impacts but no availability impact. No known exploits are currently reported in the wild. The issue was publicly disclosed on February 2, 2026, and fixed in jsPDF version 4.1.0. Organizations using vulnerable versions in their web applications or document generation pipelines should prioritize patching and input validation to prevent exploitation.
Potential Impact
For European organizations, the impact of CVE-2026-24737 can be significant, especially for those relying on jsPDF for generating PDFs dynamically in client-facing or internal applications. Exploitation can lead to execution of arbitrary JavaScript within PDF viewers, potentially compromising sensitive data confidentiality and integrity. Attackers could use this vector to deliver payloads that steal credentials, manipulate document content, or pivot within networks. Sectors such as finance, government, healthcare, and legal services, which frequently handle sensitive documents, are particularly at risk. Additionally, organizations involved in software development or SaaS platforms that embed jsPDF may inadvertently distribute malicious PDFs if the vulnerability is exploited. The requirement for user interaction (opening the PDF) means phishing or social engineering campaigns could be used to trigger the attack. While no availability impact is expected, the breach of confidentiality and integrity could result in regulatory penalties under GDPR and damage to organizational reputation.
Mitigation Recommendations
1. Upgrade all instances of jsPDF to version 4.1.0 or later, where the vulnerability is patched. 2. Implement strict input validation and sanitization on all user-supplied data passed to Acroform-related APIs, especially addOption, setOptions, and appearanceState properties. 3. Employ Content Security Policy (CSP) and PDF viewer security settings to restrict or disable JavaScript execution within PDFs where feasible. 4. Educate users and staff about the risks of opening unsolicited or unexpected PDF documents, especially those received via email or untrusted sources. 5. Monitor PDF generation workflows for anomalies or unexpected content injection attempts. 6. For organizations distributing PDFs, consider digitally signing documents to ensure integrity and authenticity. 7. Conduct security reviews and code audits of applications using jsPDF to identify and remediate unsafe usage patterns. 8. Deploy endpoint protection solutions capable of detecting malicious PDF behaviors. These steps go beyond generic patching by focusing on secure coding practices and user awareness to reduce exploitation risk.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-26T19:06:16.059Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69813005f9fa50a62f63a3e4
Added to database: 2/2/2026, 11:15:17 PM
Last enriched: 2/2/2026, 11:30:25 PM
Last updated: 2/6/2026, 8:22:46 PM
Views: 43
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2065: Missing Authentication in Flycatcher Toys smART Pixelator
MediumCVE-2026-25640: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in pydantic pydantic-ai
HighCVE-2026-25641: CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition in nyariv SandboxJS
CriticalCVE-2026-25587: CWE-94: Improper Control of Generation of Code ('Code Injection') in nyariv SandboxJS
CriticalCVE-2026-25586: CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in nyariv SandboxJS
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.