Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9pcj-m5rr-p28g | textract is vulnerable to OS Command Injection |
Tue, 31 Mar 2026 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | OS Command Injection in textract via Untrusted File Names |
Mon, 30 Mar 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-78 | |
| CPEs | cpe:2.3:a:dbashford:textract:*:*:*:*:*:node.js:*:* |
Sun, 29 Mar 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | OS Command Injection in textract via Untrusted File Names |
Sat, 28 Mar 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-94 | |
| Metrics |
cvssV3_1
|
Fri, 27 Mar 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | OS Command Injection in textract via unsanitized file path | |
| Weaknesses | CWE-78 |
Fri, 27 Mar 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | OS Command Injection in textract via unsanitized file path | |
| Weaknesses | CWE-78 |
Thu, 26 Mar 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | OS Command Injection via Malicious File Paths in textract Package | |
| Weaknesses | CWE-20 CWE-78 |
Thu, 26 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dbashford
Dbashford textract |
|
| Vendors & Products |
Dbashford
Dbashford textract |
Wed, 25 Mar 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | OS Command Injection via Malicious File Paths in textract Package | |
| Weaknesses | CWE-20 CWE-78 |
Wed, 25 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | textract through 2.5.0 is vulnerable to OS Command Injection via the file path parameter in multiple extractors. When processing files with malicious filenames, the filePath is passed directly to child_process.exec() in lib/extractors/doc.js, rtf.js, dxf.js, images.js, and lib/util.js with inadequate sanitization | |
| References |
|
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-03-28T01:12:59.787Z
Reserved: 2026-02-16T00:00:00.000Z
Link: CVE-2026-26831
Updated: 2026-03-28T01:12:42.439Z
Status : Analyzed
Published: 2026-03-25T16:16:21.123
Modified: 2026-03-30T13:33:41.273
Link: CVE-2026-26831
No data.
OpenCVE Enrichment
Updated: 2026-03-30T20:58:03Z
Github GHSA