Description
jsPDF is a library to generate PDFs in JavaScript. Prior to version 4.2.1, user control of arguments of the `createAnnotation` method allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized input to the following method, a user can inject arbitrary PDF objects, such as JavaScript actions, which might trigger when the PDF is opened or interacted with the `createAnnotation`: `color` parameter. The vulnerability has been fixed in jsPDF@4.2.1. As a workaround, sanitize user input before passing it to the vulnerable API members.
Problem types
CWE-116: Improper Encoding or Escaping of Output
Product status
References
github.com/.../jsPDF/security/advisories/GHSA-7x6v-j9x4-qf24
github.com/...ommit/4155c4819d5eca284168e51e0e1e81126b4f14b8
github.com/...e25998aea8345ae1be3/src/modules/annotations.js
github.com/parallax/jsPDF/releases/tag/v4.2.1