CVE-2026-34071

MEDIUM

Stirling-PDF has Stored Cross Site Scripting (XSS) via EML-to-HTML Export

Title source: cna

Description

Stirling-PDF is a locally hosted web application that allows you to perform various operations on PDF files. In version 2.7.3, the /api/v1/convert/eml/pdf endpoint with parameter downloadHtml=true returns unsanitized HTML from the email body with Content-Type: text/html. An attacker who sends a malicious email to a Stirling-PDF user can achieve JavaScript execution when that user exports the email using the "Download HTML intermediate file" feature. Version 2.8.0 fixes the issue.

Scores

CVSS v3 5.4
EPSS 0.0004
EPSS Percentile 11.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

Details

CWE
CWE-79
Status published
Products (2)
stirlingpdf/stirling_pdf 2.7.3
Stirling-Tools/Stirling-PDF = 2.7.3
Published Mar 26, 2026
Tracked Since Mar 26, 2026