Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25535: CWE-400: Uncontrolled Resource Consumption in parallax jsPDF

0
High
VulnerabilityCVE-2026-25535cvecve-2026-25535cwe-400cwe-770
Published: Thu Feb 19 2026 (02/19/2026, 14:34:05 UTC)
Source: CVE Database V5
Vendor/Project: parallax
Product: jsPDF

Description

jsPDF is a library to generate PDFs in JavaScript. Prior to 4.2.0, user control of the first argument of the `addImage` method results in denial of service. If given the possibility to pass unsanitized image data or URLs to the `addImage` method, a user can provide a harmful GIF file that results in out of memory errors and denial of service. Harmful GIF files have large width and/or height entries in their headers, which lead to excessive memory allocation. Other affected methods are: `html`. The vulnerability has been fixed in jsPDF 4.2.0. As a workaround, sanitize image data or URLs before passing it to the addImage method or one of the other affected methods.

AI-Powered Analysis

AILast updated: 02/19/2026, 15:03:55 UTC

Technical Analysis

CVE-2026-25535 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) and CWE-770 (Allocation of Resources Without Limits or Throttling) affecting the parallax jsPDF JavaScript library used for generating PDFs. Prior to version 4.2.0, the addImage method accepts user-controlled input as its first argument, which can be exploited by attackers to supply malicious GIF files with artificially inflated width and height header values. These oversized dimensions cause the library to allocate excessive amounts of memory during image processing, leading to out-of-memory conditions and denial of service (DoS). The vulnerability extends to other methods such as html that also process image data. Exploitation requires no privileges, authentication, or user interaction, and can be triggered remotely by passing crafted image data or URLs. The issue was publicly disclosed and fixed in version 4.2.0 of jsPDF. No known exploits have been reported in the wild yet. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required, and high impact on availability with no impact on confidentiality or integrity.

Potential Impact

This vulnerability poses a significant risk to any web application or service that uses vulnerable versions of jsPDF to generate PDFs from user-supplied content, especially where image data or URLs are accepted without proper sanitization. An attacker can remotely trigger a denial of service by causing the application to exhaust server memory resources, potentially crashing the service or severely degrading performance. This can disrupt business operations, lead to downtime, and impact user experience. Since jsPDF is widely used in web applications globally, the scope of affected systems is broad. The lack of authentication or user interaction requirements makes exploitation straightforward. While confidentiality and integrity are not directly impacted, availability degradation can have cascading effects on dependent systems and services. Organizations relying on jsPDF for PDF generation in client-side or server-side environments should consider this a high-priority issue.

Mitigation Recommendations

The primary mitigation is to upgrade all instances of jsPDF to version 4.2.0 or later, where this vulnerability has been fixed. If immediate upgrade is not feasible, organizations should implement strict sanitization and validation of all image data and URLs passed to the addImage and html methods to ensure that image dimensions are within safe bounds and that malicious GIF files cannot be processed. Employing input validation libraries or custom checks to reject images with suspiciously large width or height values is critical. Additionally, implementing resource usage limits and timeouts on PDF generation processes can help contain potential denial of service attempts. Monitoring application logs for abnormal memory usage or crashes related to PDF generation can provide early detection. Finally, consider isolating PDF generation in sandboxed environments to limit impact on core services.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-02T19:59:47.374Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6997264f521539184371324a

Added to database: 2/19/2026, 3:03:43 PM

Last enriched: 2/19/2026, 3:03:55 PM

Last updated: 2/20/2026, 11:01:33 PM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats