CVE-2026-34071
MEDIUMStirling-PDF has Stored Cross Site Scripting (XSS) via EML-to-HTML Export
Title source: cnaDescription
Stirling-PDF is a locally hosted web application that allows you to perform various operations on PDF files. In version 2.7.3, the /api/v1/convert/eml/pdf endpoint with parameter downloadHtml=true returns unsanitized HTML from the email body with Content-Type: text/html. An attacker who sends a malicious email to a Stirling-PDF user can achieve JavaScript execution when that user exports the email using the "Download HTML intermediate file" feature. Version 2.8.0 fixes the issue.
Scores
CVSS v3
5.4
EPSS
0.0004
EPSS Percentile
11.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Details
CWE
CWE-79
Status
published
Products (2)
stirlingpdf/stirling_pdf
2.7.3
Stirling-Tools/Stirling-PDF
= 2.7.3
Published
Mar 26, 2026
Tracked Since
Mar 26, 2026