The ps encoders, responsible for writing PostScript files, fails to sanitize the input before writing it into the PostScript header. An attacker can provide a malicious file and inject arbitrary PostScript code. When the resulting file is processed by a printer or a viewer (like Ghostscript), the injected code is interpreted and executed.
The html encoder does not properly escape strings that are written to in the html document. An attacker can provide a malicious file and injection arbitrary html code.
{
"github_reviewed_at": "2026-02-24T15:34:26Z",
"nvd_published_at": "2026-02-24T01:16:14Z",
"severity": "MODERATE",
"cwe_ids": [
"CWE-94"
],
"github_reviewed": true
}