jsPDF is a library to generate PDFs in JavaScript. Prior to 3.0.2, user control of the first argument of the addImage method results in CPU utilization and denial of service. If given the possibility to pass unsanitized image data or URLs to the addImage method, a user can provide a harmful PNG file that results in high CPU utilization and denial of service. The vulnerability was fixed in jsPDF 3.0.2.
Metrics
Affected Vendors & Products
References
History
Thu, 28 Aug 2025 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Wed, 27 Aug 2025 11:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Parall
Parall jspdf |
|
Vendors & Products |
Parall
Parall jspdf |
Tue, 26 Aug 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 26 Aug 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | jsPDF is a library to generate PDFs in JavaScript. Prior to 3.0.2, user control of the first argument of the addImage method results in CPU utilization and denial of service. If given the possibility to pass unsanitized image data or URLs to the addImage method, a user can provide a harmful PNG file that results in high CPU utilization and denial of service. The vulnerability was fixed in jsPDF 3.0.2. | |
Title | jsPDF Parsing of Corrupt PNGs Leads to Potential Denial of Service (DoS) | |
Weaknesses | CWE-20 CWE-770 |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-08-26T15:37:28.071Z
Updated: 2025-08-26T15:58:25.184Z
Reserved: 2025-08-20T14:30:35.010Z
Link: CVE-2025-57810

Updated: 2025-08-26T15:58:15.728Z

Status : Awaiting Analysis
Published: 2025-08-26T16:15:37.827
Modified: 2025-08-29T16:22:31.970
Link: CVE-2025-57810
