CVE-2026-25535: CWE-400: Uncontrolled Resource Consumption in parallax jsPDF
jsPDF is a library to generate PDFs in JavaScript. Prior to 4.2.0, user control of the first argument of the `addImage` method results in denial of service. If given the possibility to pass unsanitized image data or URLs to the `addImage` method, a user can provide a harmful GIF file that results in out of memory errors and denial of service. Harmful GIF files have large width and/or height entries in their headers, which lead to excessive memory allocation. Other affected methods are: `html`. The vulnerability has been fixed in jsPDF 4.2.0. As a workaround, sanitize image data or URLs before passing it to the addImage method or one of the other affected methods.
AI Analysis
Technical Summary
CVE-2026-25535 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) and CWE-770 (Allocation of Resources Without Limits or Throttling) affecting the parallax jsPDF JavaScript library used for generating PDFs. Prior to version 4.2.0, the addImage method accepts user-controlled input as its first argument, which can be exploited by attackers to supply malicious GIF files with artificially inflated width and height header values. These oversized dimensions cause the library to allocate excessive amounts of memory during image processing, leading to out-of-memory conditions and denial of service (DoS). The vulnerability extends to other methods such as html that also process image data. Exploitation requires no privileges, authentication, or user interaction, and can be triggered remotely by passing crafted image data or URLs. The issue was publicly disclosed and fixed in version 4.2.0 of jsPDF. No known exploits have been reported in the wild yet. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required, and high impact on availability with no impact on confidentiality or integrity.
Potential Impact
This vulnerability poses a significant risk to any web application or service that uses vulnerable versions of jsPDF to generate PDFs from user-supplied content, especially where image data or URLs are accepted without proper sanitization. An attacker can remotely trigger a denial of service by causing the application to exhaust server memory resources, potentially crashing the service or severely degrading performance. This can disrupt business operations, lead to downtime, and impact user experience. Since jsPDF is widely used in web applications globally, the scope of affected systems is broad. The lack of authentication or user interaction requirements makes exploitation straightforward. While confidentiality and integrity are not directly impacted, availability degradation can have cascading effects on dependent systems and services. Organizations relying on jsPDF for PDF generation in client-side or server-side environments should consider this a high-priority issue.
Mitigation Recommendations
The primary mitigation is to upgrade all instances of jsPDF to version 4.2.0 or later, where this vulnerability has been fixed. If immediate upgrade is not feasible, organizations should implement strict sanitization and validation of all image data and URLs passed to the addImage and html methods to ensure that image dimensions are within safe bounds and that malicious GIF files cannot be processed. Employing input validation libraries or custom checks to reject images with suspiciously large width or height values is critical. Additionally, implementing resource usage limits and timeouts on PDF generation processes can help contain potential denial of service attempts. Monitoring application logs for abnormal memory usage or crashes related to PDF generation can provide early detection. Finally, consider isolating PDF generation in sandboxed environments to limit impact on core services.
Affected Countries
United States, Germany, United Kingdom, France, India, China, Japan, Canada, Australia, Brazil
CVE-2026-25535: CWE-400: Uncontrolled Resource Consumption in parallax jsPDF
Description
jsPDF is a library to generate PDFs in JavaScript. Prior to 4.2.0, user control of the first argument of the `addImage` method results in denial of service. If given the possibility to pass unsanitized image data or URLs to the `addImage` method, a user can provide a harmful GIF file that results in out of memory errors and denial of service. Harmful GIF files have large width and/or height entries in their headers, which lead to excessive memory allocation. Other affected methods are: `html`. The vulnerability has been fixed in jsPDF 4.2.0. As a workaround, sanitize image data or URLs before passing it to the addImage method or one of the other affected methods.
AI-Powered Analysis
Technical Analysis
CVE-2026-25535 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) and CWE-770 (Allocation of Resources Without Limits or Throttling) affecting the parallax jsPDF JavaScript library used for generating PDFs. Prior to version 4.2.0, the addImage method accepts user-controlled input as its first argument, which can be exploited by attackers to supply malicious GIF files with artificially inflated width and height header values. These oversized dimensions cause the library to allocate excessive amounts of memory during image processing, leading to out-of-memory conditions and denial of service (DoS). The vulnerability extends to other methods such as html that also process image data. Exploitation requires no privileges, authentication, or user interaction, and can be triggered remotely by passing crafted image data or URLs. The issue was publicly disclosed and fixed in version 4.2.0 of jsPDF. No known exploits have been reported in the wild yet. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required, and high impact on availability with no impact on confidentiality or integrity.
Potential Impact
This vulnerability poses a significant risk to any web application or service that uses vulnerable versions of jsPDF to generate PDFs from user-supplied content, especially where image data or URLs are accepted without proper sanitization. An attacker can remotely trigger a denial of service by causing the application to exhaust server memory resources, potentially crashing the service or severely degrading performance. This can disrupt business operations, lead to downtime, and impact user experience. Since jsPDF is widely used in web applications globally, the scope of affected systems is broad. The lack of authentication or user interaction requirements makes exploitation straightforward. While confidentiality and integrity are not directly impacted, availability degradation can have cascading effects on dependent systems and services. Organizations relying on jsPDF for PDF generation in client-side or server-side environments should consider this a high-priority issue.
Mitigation Recommendations
The primary mitigation is to upgrade all instances of jsPDF to version 4.2.0 or later, where this vulnerability has been fixed. If immediate upgrade is not feasible, organizations should implement strict sanitization and validation of all image data and URLs passed to the addImage and html methods to ensure that image dimensions are within safe bounds and that malicious GIF files cannot be processed. Employing input validation libraries or custom checks to reject images with suspiciously large width or height values is critical. Additionally, implementing resource usage limits and timeouts on PDF generation processes can help contain potential denial of service attempts. Monitoring application logs for abnormal memory usage or crashes related to PDF generation can provide early detection. Finally, consider isolating PDF generation in sandboxed environments to limit impact on core services.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-02T19:59:47.374Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6997264f521539184371324a
Added to database: 2/19/2026, 3:03:43 PM
Last enriched: 2/19/2026, 3:03:55 PM
Last updated: 2/20/2026, 11:01:33 PM
Views: 37
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumCVE-2026-27025: CWE-834: Excessive Iteration in py-pdf pypdf
MediumCVE-2026-27024: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in py-pdf pypdf
MediumCVE-2026-27022: CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in langchain-ai langgraphjs
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.