CVE-2026-33436
LOWStirling-PDF: Reflected XSS through crafted filename in file upload functionality
Title source: cnaDescription
Stirling-PDF is a locally hosted web application that facilitates various operations on PDF files. In versions prior to 2.0.0, file upload endpoints render user-supplied filenames directly into HTML using unsafe methods like innerHTML without sanitization. An attacker can craft a file with a malicious filename containing JavaScript that executes in the uploading user's browser context, resulting in reflected XSS. The issue affects numerous upload endpoints across the application. The issue has been fixed in version 2.0.0.
Scores
CVSS v3
3.1
EPSS
0.0005
EPSS Percentile
14.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-116
CWE-20
CWE-79
Status
published
Products (1)
Stirling-Tools/Stirling-PDF
< 2.0.0
Published
Apr 17, 2026
Tracked Since
Apr 18, 2026