html2pdf.js contains a cross-site scripting (XSS) vulnerability when given a text source rather than an element. This text is not sufficiently sanitized before being attached to the DOM, allowing malicious scripts to be run on the client browser and risking the confidentiality, integrity, and availability of the page's data.
Example attack vector:
import html2pdf from 'html2pdf.js/src/index.js';
const maliciousHTML = '<img src=x onerror="alert(document.cookie)">';
html2pdf(maliciousHTML);
// or html2pdf().from(maliciousHTML);
This vulnerability has been fixed in html2pdf.js@0.14.0 to sanitize text sources using DOMPurify. There are no other breaking changes in this version.
Users of earlier versions of html2pdf.js must safely sanitize any text before using it as a source in html2pdf.js.
{
"cwe_ids": [
"CWE-79"
],
"github_reviewed_at": "2026-01-14T16:53:10Z",
"nvd_published_at": "2026-01-14T17:16:09Z",
"severity": "HIGH",
"github_reviewed": true
}