GHSA-w8x4-x68c-m6fc

Suggest an improvement
Source
https://github.com/advisories/GHSA-w8x4-x68c-m6fc
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/01/GHSA-w8x4-x68c-m6fc/GHSA-w8x4-x68c-m6fc.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-w8x4-x68c-m6fc
Aliases
  • CVE-2026-22787
Published
2026-01-14T16:53:10Z
Modified
2026-02-03T03:11:31.431997Z
Severity
  • 8.7 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N CVSS Calculator
Summary
html2pdf.js contains a cross-site scripting vulnerability
Details

Impact

html2pdf.js contains a cross-site scripting (XSS) vulnerability when given a text source rather than an element. This text is not sufficiently sanitized before being attached to the DOM, allowing malicious scripts to be run on the client browser and risking the confidentiality, integrity, and availability of the page's data.

Example attack vector:

import html2pdf from 'html2pdf.js/src/index.js';

const maliciousHTML = '<img src=x onerror="alert(document.cookie)">';
html2pdf(maliciousHTML);
// or html2pdf().from(maliciousHTML);

Patches

This vulnerability has been fixed in html2pdf.js@0.14.0 to sanitize text sources using DOMPurify. There are no other breaking changes in this version.

Workarounds

Users of earlier versions of html2pdf.js must safely sanitize any text before using it as a source in html2pdf.js.

References

  • Initial report: https://github.com/eKoopmans/html2pdf.js/issues/865
  • Fix: https://github.com/eKoopmans/html2pdf.js/pull/877, v0.14.0
  • CVE-2026-22787: https://nvd.nist.gov/vuln/detail/CVE-2026-22787
Database specific
{
    "cwe_ids": [
        "CWE-79"
    ],
    "github_reviewed_at": "2026-01-14T16:53:10Z",
    "nvd_published_at": "2026-01-14T17:16:09Z",
    "severity": "HIGH",
    "github_reviewed": true
}
References

Affected packages

npm / html2pdf.js

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.14.0

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/01/GHSA-w8x4-x68c-m6fc/GHSA-w8x4-x68c-m6fc.json"