Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-67pg-wm7f-q7fj | jsPDF Affected by Client-Side/Server-Side Denial of Service via Malicious GIF Dimensions |
Mon, 23 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:parall:jspdf:*:*:*:*:*:node.js:*:* |
Fri, 20 Feb 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Parall
Parall jspdf |
|
| Vendors & Products |
Parall
Parall jspdf |
Fri, 20 Feb 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Thu, 19 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | jsPDF is a library to generate PDFs in JavaScript. Prior to 4.2.0, user control of the first argument of the `addImage` method results in denial of service. If given the possibility to pass unsanitized image data or URLs to the `addImage` method, a user can provide a harmful GIF file that results in out of memory errors and denial of service. Harmful GIF files have large width and/or height entries in their headers, which lead to excessive memory allocation. Other affected methods are: `html`. The vulnerability has been fixed in jsPDF 4.2.0. As a workaround, sanitize image data or URLs before passing it to the addImage method or one of the other affected methods. | |
| Title | jsPDF Affected by Client-Side/Server-Side Denial of Service via Malicious GIF Dimensions | |
| Weaknesses | CWE-400 CWE-770 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-19T16:03:26.484Z
Reserved: 2026-02-02T19:59:47.374Z
Link: CVE-2026-25535
Updated: 2026-02-19T16:03:09.356Z
Status : Analyzed
Published: 2026-02-19T15:16:12.130
Modified: 2026-02-23T19:13:18.717
Link: CVE-2026-25535
OpenCVE Enrichment
Updated: 2026-04-17T18:15:26Z
Github GHSA