CVE-2026-33436

LOW

Stirling-PDF: Reflected XSS through crafted filename in file upload functionality

Title source: cna
STIX 2.1

Description

Stirling-PDF is a locally hosted web application that facilitates various operations on PDF files. In versions prior to 2.0.0, file upload endpoints render user-supplied filenames directly into HTML using unsafe methods like innerHTML without sanitization. An attacker can craft a file with a malicious filename containing JavaScript that executes in the uploading user's browser context, resulting in reflected XSS. The issue affects numerous upload endpoints across the application. The issue has been fixed in version 2.0.0.

Scores

CVSS v3 3.1
EPSS 0.0005
EPSS Percentile 14.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-116 CWE-20 CWE-79
Status published
Products (1)
Stirling-Tools/Stirling-PDF < 2.0.0
Published Apr 17, 2026
Tracked Since Apr 18, 2026