Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-vm32-vv63-w422 | jsPDF Vulnerable to Stored XMP Metadata Injection (Spoofing & Integrity Violation) |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 04 Feb 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Parall
Parall jspdf |
|
| Vendors & Products |
Parall
Parall jspdf |
Wed, 04 Feb 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-91 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Tue, 03 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 02 Feb 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | jsPDF is a library to generate PDFs in JavaScript. Prior to 4.1.0, user control of the first argument of the addMetadata function allows users to inject arbitrary XML. If given the possibility to pass unsanitized input to the addMetadata method, a user can inject arbitrary XMP metadata into the generated PDF. If the generated PDF is signed, stored or otherwise processed after, the integrity of the PDF can no longer be guaranteed. The vulnerability has been fixed in jsPDF@4.1.0. | |
| Title | jsPDF Affected by Stored XMP Metadata Injection (Spoofing & Integrity Violation) | |
| Weaknesses | CWE-74 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-03T15:27:51.282Z
Reserved: 2026-01-20T22:30:11.777Z
Link: CVE-2026-24043
Updated: 2026-02-03T15:27:45.447Z
Status : Awaiting Analysis
Published: 2026-02-02T23:16:07.813
Modified: 2026-02-03T16:44:03.343
Link: CVE-2026-24043
OpenCVE Enrichment
Updated: 2026-02-04T12:17:44Z
Github GHSA