CVE-2025-68428

HIGH

Parall Jspdf < 4.0.0 - Path Traversal

Title source: rule

Description

jsPDF is a library to generate PDFs in JavaScript. Prior to version 4.0.0, user control of the first argument of the loadFile method in the node.js build allows local file inclusion/path traversal. If given the possibility to pass unsanitized paths to the loadFile method, a user can retrieve file contents of arbitrary files in the local file system the node process is running in. The file contents are included verbatim in the generated PDFs. Other affected methods are `addImage`, `html`, and `addFont`. Only the node.js builds of the library are affected, namely the `dist/jspdf.node.js` and `dist/jspdf.node.min.js` files. The vulnerability has been fixed in [email protected]. This version restricts file system access per default. This semver-major update does not introduce other breaking changes. Some workarounds areavailable. With recent node versions, jsPDF recommends using the `--permission` flag in production. The feature was introduced experimentally in v20.0.0 and is stable since v22.13.0/v23.5.0/v24.0.0. For older node versions, sanitize user-provided paths before passing them to jsPDF.

Exploits (2)

nomisec WORKING POC 24 stars
by 12nio · poc
https://github.com/12nio/CVE-2025-68428_PoC
nomisec SCANNER
by Nurjaman2004 · poc
https://github.com/Nurjaman2004/jsPDF-Bulk-Detector-CVE-2025-68428-

Scores

CVSS v3 7.5
EPSS 0.0002
EPSS Percentile 6.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

CWE
CWE-22 CWE-35 CWE-73
Status published
Products (2)
npm/jspdf 0 - 4.0.0npm
parall/jspdf < 4.0.0
Published Jan 05, 2026
Tracked Since Feb 18, 2026