Home

Description

PDF Export Module used in DHTMLX's products Gantt and Scheduler is vulnerable to Remote Code Execution due to lack of "data" parameter sanitization. An unauthenticated attacker can inject the malicious JavaScript code to the parameter whose value is processed by Node.js and subsequently executed. This can lead to server compromise. This issue was fixed in PDF Export Module version 0.7.6.

PUBLISHED Reserved 2026-04-21 | Published 2026-05-15 | Updated 2026-05-15 | Assigner CERT-PL




CRITICAL: 10.0CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem types

CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

Default status
unaffected

0.3.3 (semver) before 0.7.6
affected

Credits

Łukasz Jaworski (Pentest Limited) finder

Tomasz Holeksa (Pentest Limited) finder

References

cert.pl/en/posts/2026/05/CVE-2026-7182 third-party-advisory

docs.dhtmlx.com/gantt/guides/pdf-export-module-whatsnew/ release-notes

cve.org (CVE-2026-41553)

nvd.nist.gov (CVE-2026-41553)

Download JSON