Update dependency jspdf to v4 [SECURITY] - autoclosed#871
Closed
renovate[bot] wants to merge 1 commit into
Closed
Conversation
Deploying newsdesk with
|
| Latest commit: |
a465af2
|
| Status: | ✅ Deploy successful! |
| Preview URL: | https://77feb7b0.newsdesk.pages.dev |
| Branch Preview URL: | https://renovate-npm-jspdf-vulnerabi.newsdesk.pages.dev |
|
auto-merge was automatically disabled
March 17, 2026 20:52
Pull request was closed
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.



This PR contains the following updates:
2.5.1→4.2.1GitHub Vulnerability Alerts
CVE-2026-31938
Impact
User control of the
optionsargument of theoutputfunction allows attackers to inject arbitrary HTML (such as scripts) into the browser context the created PDF is opened in. The affected overloads and options are:"pdfobjectnewwindow": thepdfObjectUrloption and the entire options object, which is JSON-serialized and included verbatim in the generated HTML-string."pdfjsnewwindow": thepdfJsUrlandfilenameoptions"dataurlnewwindow": thefilenameoptionThe vulnerability can be exploited in the following scenario: the attacker provides values for the output options, for example via a web interface. These values are then passed unsanitized (automatically or semi-automatically) to the attack victim. The victim creates and opens a PDF with the attack vector using one of the vulnerable method overloads inside their browser. The attacker can thus inject scripts that run in the victims browser context and can extract or modify secrets from this context.
Example attack vector:
Patches
The vulnerability has been fixed in jspdf@4.2.1.
Workarounds
Sanitize user input before passing it to the output method.
CVE-2026-31898
Impact
User control of arguments of the
createAnnotationmethod allows users to inject arbitrary PDF objects, such as JavaScript actions.If given the possibility to pass unsanitized input to the following method, a user can inject arbitrary PDF objects, such as JavaScript actions, which might trigger when the PDF is opened or interacted with..
createAnnotation:colorparameterExample attack vector:
Patches
The vulnerability has been fixed in jsPDF@4.2.1.
Workarounds
Sanitize user input before passing it to the vulnerable API members.
Release Notes
parallax/jsPDF (jspdf)
v4.2.1Compare Source
This release fixes two security issues.
What's Changed
Full Changelog: parallax/jsPDF@v4.2.0...v4.2.1
v4.2.0Compare Source
This release fixes three security issues.
What's Changed
New Contributors
Full Changelog: parallax/jsPDF@v4.1.0...v4.2.0
v4.1.0Compare Source
This release fixes several security issues.
What's Changed
Full Changelog: parallax/jsPDF@v4.0.0...v4.1.0
v4.0.0Compare Source
This release fixes a critical path traversal/local file inclusion security vulnerability in the jsPDF Node.js build. File system access is now restricted by default and can be enabled by either using node's
--permissionflag or the newjsPDF.allowFsReadproperty.There are no other breaking changes.
v3.0.4Compare Source
This release includes a bunch of bugfixes. Thanks to all contributors!
What's Changed
New Contributors
Full Changelog: parallax/jsPDF@v3.0.3...v3.1.0
v3.0.3Compare Source
This release fixes regressions with PNG encoding that were introduced in v3.0.2.
What's Changed
New Contributors
Full Changelog: parallax/jsPDF@v3.0.2...v3.0.3
v3.0.2Compare Source
This release fixes a security issue where parsing of corrupt PNG images could lead to long running loops and denial of service.
What's Changed
New Contributors
Full Changelog: parallax/jsPDF@v3.0.1...v3.0.2
v3.0.1Compare Source
This release fixes two security vulnerabilities:
addImagemethod and the methodshtmlandaddSvgAsImage, which depend onaddImagev3.0.0Compare Source
This major release officially drops support for Internet Explorer and fixes a security vulnerability in the
htmlfunction by updating the optional dependencydompurifyto v3.2.4. There are no other breaking changes.New Contributors
Full Changelog: parallax/jsPDF@v2.5.2...v3.0.0
v2.5.2Compare Source
This release upgrades the Dompurify dependency to 2.5.4 with fixes a vulnerability with high severity: GHSA-mmhx-hmjr-r674.
It also upgrades fflate, core-js, and @babel/runtime to more recent versions.
What's Changed
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
Automerge: Enabled