๐Ÿ” CVE Alert

CVE-2026-31938

CRITICAL 9.6

jsPDF has HTML Injection in New Window paths

CVSS Score
9.6
EPSS Score
0.0%
EPSS Percentile
0th

jsPDF is a library to generate PDFs in JavaScript. Prior to version 4.2.1, user control of the `options` argument of the `output` function allows attackers to inject arbitrary HTML (such as scripts) into the browser context the created PDF is opened in. The vulnerability can be exploited in the following scenario: the attacker provides values for the output options, for example via a web interface. These values are then passed unsanitized (automatically or semi-automatically) to the attack victim. The victim creates and opens a PDF with the attack vector using one of the vulnerable method overloads inside their browser. The attacker can thus inject scripts that run in the victims browser context and can extract or modify secrets from this context. The vulnerability has been fixed in [email protected]. As a workaround, sanitize user input before passing it to the output method.

CWE CWE-79
Vendor parallax
Product jspdf
Published Mar 18, 2026
Last Updated Mar 18, 2026
Stay Ahead of the Next One

Get instant alerts for parallax jspdf

Be the first to know when new critical vulnerabilities affecting parallax jspdf are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
Low

Affected Versions

parallax / jsPDF
< 4.2.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/parallax/jsPDF/security/advisories/GHSA-wfv2-pwc8-crg5 github.com: https://github.com/parallax/jsPDF/commit/87a40bbd07e6b30575196370670b41f264aa78d7 github.com: https://github.com/parallax/jsPDF/releases/tag/v4.2.1