jsPDF is a library to generate PDFs in JavaScript. Prior to 3.0.1, user control of the first argument of the addImage method results in CPU utilization and denial of service. If given the possibility to pass unsanitised image urls to the addImage method, a user can provide a harmful data-url that results in high CPU utilization and denial of service. Other affected methods are html and addSvgAsImage. The vulnerability was fixed in jsPDF 3.0.1.
Metrics
Affected Vendors & Products
References
History
Tue, 18 Mar 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 18 Mar 2025 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | jsPDF is a library to generate PDFs in JavaScript. Prior to 3.0.1, user control of the first argument of the addImage method results in CPU utilization and denial of service. If given the possibility to pass unsanitised image urls to the addImage method, a user can provide a harmful data-url that results in high CPU utilization and denial of service. Other affected methods are html and addSvgAsImage. The vulnerability was fixed in jsPDF 3.0.1. | |
Title | jsPDF Bypass Regular Expression Denial of Service (ReDoS) | |
Weaknesses | CWE-400 CWE-770 |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-03-18T18:40:57.504Z
Updated: 2025-03-18T19:02:49.720Z
Reserved: 2025-03-12T13:42:22.134Z
Link: CVE-2025-29907

Updated: 2025-03-18T19:00:41.885Z

Status : Received
Published: 2025-03-18T19:15:51.197
Modified: 2025-03-18T19:15:51.197
Link: CVE-2025-29907

No data.