CVE-2026-33436
Stirling-PDF: Reflected XSS through crafted filename in file upload functionality
CVSS Score
3.1
EPSS Score
0.0%
EPSS Percentile
0th
Stirling-PDF is a locally hosted web application that facilitates various operations on PDF files. In versions prior to 2.0.0, file upload endpoints render user-supplied filenames directly into HTML using unsafe methods like innerHTML without sanitization. An attacker can craft a file with a malicious filename containing JavaScript that executes in the uploading user's browser context, resulting in reflected XSS. The issue affects numerous upload endpoints across the application. The issue has been fixed in version 2.0.0.
| CWE | CWE-20 CWE-79 CWE-116 |
| Vendor | stirling-tools |
| Product | stirling-pdf |
| Published | Apr 17, 2026 |
Stay Ahead of the Next One
Get instant alerts for stirling-tools stirling-pdf
Be the first to know when new low vulnerabilities affecting stirling-tools stirling-pdf are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Affected Versions
Stirling-Tools / Stirling-PDF
< 2.0.0