LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-31898

CVE-2026-31898 - Vulnerability Analysis

HighCVSS: 8.1

Last Updated: March 18, 2026

jsPDF - Stored XSS

Published: March 18, 2026Updated: March 18, 2026Remote Exploitable

Overview

jsPDF < 4.2.1 contains a stored XSS caused by unsanitized user input in the createAnnotation method's color parameter, letting attackers inject arbitrary PDF objects including JavaScript actions, exploit requires passing unsanitized input.

Severity & Score

Severity: High
CVSS Score: 8.1
EPSS Score: 3.0%(Probability of exploitation in next 30 days)

Impact

Attackers can inject malicious JavaScript in PDFs, potentially executing code when the PDF is opened or interacted with.

Mitigation

Update to version 4.2.1 or later; sanitize user input before passing to createAnnotation.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 18, 2026

🟠 CVE-2026-31898 - High (8.1) jsPDF is a library to generate PDFs in JavaScript. Prior to version 4.2.1, user control of arguments of the `createAnnotation` method allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsani... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-31898/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-31898
Severity
High
CVSS Score
8.1
Type
stored_xss
Status
unconfirmed
EPSS
3.0%
Social Posts
1

CWE

  • CWE-116

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

EPSS Score

3.0%Probability of exploitation in the next 30 days