CVE-2025-57810

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-57810
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-57810.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-57810
Aliases
Related
Published
2025-08-26T16:15:37Z
Modified
2025-08-27T02:18:58.142719Z
Summary
[none]
Details

jsPDF is a library to generate PDFs in JavaScript. Prior to 3.0.2, user control of the first argument of the addImage method results in CPU utilization and denial of service. If given the possibility to pass unsanitized image data or URLs to the addImage method, a user can provide a harmful PNG file that results in high CPU utilization and denial of service. The vulnerability was fixed in jsPDF 3.0.2.

References

Affected packages

Git / github.com/parallax/jspdf

Affected ranges

Type
GIT
Repo
https://github.com/parallax/jspdf
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

1.*

1.1.135
1.3.4

v.*

v.1.4.0

v0.*

v0.9.0

v1.*

v1.0.106
v1.0.115
v1.0.116
v1.0.119
v1.0.138
v1.0.150
v1.0.178
v1.0.272
v1.2.60
v1.2.61
v1.3.0
v1.3.1
v1.3.2
v1.3.3
v1.3.4
v1.3.5
v1.4.0
v1.4.1
v1.5.0
v1.5.1
v1.5.2
v1.5.3

Other

v2,1,0

v2.*

v2.0.0
v2.1.1
v2.2.0
v2.3.0
v2.3.1
v2.4.0
v2.5.0
v2.5.1
v2.5.2

v3.*

v3.0.0
v3.0.1