Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26801: n/a

0
High
VulnerabilityCVE-2026-26801cvecve-2026-26801
Published: Tue Mar 10 2026 (03/10/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Server-Side Request Forgery (SSRF) vulnerability in pdfmake versions 0.3.0-beta.2 through 0.3.5 allows a remote attacker to obtain sensitive information via the src/URLResolver.js component. The fix was released in version 0.3.6 which introduces the setUrlAccessPolicy() method allowing server operators to define URL access rules. A warning is now logged when pdfmake is used server-side without a policy configured.

AI-Powered Analysis

AILast updated: 03/10/2026, 18:45:31 UTC

Technical Analysis

CVE-2026-26801 identifies a Server-Side Request Forgery (SSRF) vulnerability in the pdfmake library, specifically in versions 0.3.0-beta.2 through 0.3.5. The vulnerability resides in the src/URLResolver.js component, which is responsible for resolving URLs when pdfmake processes PDF generation requests. SSRF occurs when an attacker can manipulate server-side code to make HTTP requests to arbitrary URLs, potentially accessing internal resources or sensitive information not intended to be exposed externally. In this case, the vulnerability allows remote attackers to craft malicious inputs that cause the server running pdfmake to fetch unauthorized URLs, leading to information disclosure or further internal network reconnaissance. The vulnerability was addressed in version 0.3.6 by introducing the setUrlAccessPolicy() method, which allows server operators to define strict URL access rules, effectively restricting which URLs pdfmake can access during PDF generation. Additionally, pdfmake now logs warnings when used server-side without a configured URL access policy, encouraging administrators to enforce security controls. No CVSS score has been assigned yet, and no known exploits have been reported in the wild. The vulnerability is significant for environments where pdfmake is used server-side to generate PDFs from untrusted or user-supplied data, as it could be leveraged to bypass network segmentation or access sensitive internal endpoints.

Potential Impact

The SSRF vulnerability in pdfmake can lead to unauthorized internal network scanning, access to sensitive internal services, and potential leakage of confidential information. Organizations using vulnerable pdfmake versions in server-side PDF generation workflows are at risk of attackers exploiting this flaw to pivot into internal systems or exfiltrate data. This can compromise confidentiality and potentially integrity if internal services are manipulated. The impact is heightened in environments where pdfmake processes untrusted input or where internal network resources are accessible but not externally exposed. Although no known exploits exist currently, the ease of exploitation typical of SSRF vulnerabilities combined with the widespread use of pdfmake in web applications and services could lead to significant security incidents if left unmitigated. The availability impact is generally low but could increase if attackers leverage SSRF to trigger denial-of-service conditions on internal services.

Mitigation Recommendations

Organizations should immediately upgrade pdfmake to version 0.3.6 or later to obtain the fix for CVE-2026-26801. Beyond upgrading, it is critical to configure the setUrlAccessPolicy() method to explicitly define and restrict allowed URL patterns, minimizing the attack surface for SSRF. Server operators should audit all server-side uses of pdfmake to ensure no untrusted input is processed without proper validation and sanitization. Network-level controls such as firewall rules or internal segmentation should be employed to limit the server's ability to make arbitrary outbound HTTP requests, especially to sensitive internal endpoints. Monitoring and alerting on unusual outbound requests from servers running pdfmake can help detect exploitation attempts. Additionally, reviewing application logs for the new warnings about missing URL access policies can identify vulnerable deployments. Regular security assessments and penetration testing should include checks for SSRF vulnerabilities in PDF generation components.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-02-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69b063a09972381a98a3a04a

Added to database: 3/10/2026, 6:32:00 PM

Last enriched: 3/10/2026, 6:45:31 PM

Last updated: 3/14/2026, 12:38:52 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses