-
Notifications
You must be signed in to change notification settings - Fork 3
fix(deps): update dependency jspdf to v4 [security] #1334
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## master #1334 +/- ##
=======================================
Coverage 18.35% 18.35%
=======================================
Files 454 454
Lines 74865 74865
Branches 1594 1597 +3
=======================================
+ Hits 13743 13744 +1
+ Misses 61122 61121 -1
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
Playwright test resultsDetails
Failed testschromium-setup › auth.setup.ts › authenticate as user - Skipped testschromium › authentication.test.ts › Authentication › should load unauthorized routes as expected with and without authentication - |
67acdd6 to
030b595
Compare
3e7f371 to
0131aa9
Compare
3167b90 to
3327c92
Compare
b2dadef to
c222e52
Compare
d23d9a3 to
9ca1dd9
Compare
aaf50b5 to
adcbb45
Compare
75117d1 to
2202f2b
Compare
cc23619 to
1f1574b
Compare
571417d to
91d9fa0
Compare
984450b to
e7f28d1
Compare
73cf98a to
8890be3
Compare
75d5bd2 to
e89d0cc
Compare
c6f4ba6 to
470f313
Compare
9eb7dfa to
69c7949
Compare
4709962 to
209e9a3
Compare
a700d4c to
21e95c7
Compare
f557b64 to
2389905
Compare
2389905 to
d472133
Compare
d472133 to
bcc4bbc
Compare
bcc4bbc to
de9ed42
Compare
de9ed42 to
e45e627
Compare
This PR contains the following updates:
^2.5.1→^4.0.0GitHub Vulnerability Alerts
CVE-2025-29907
Impact
User control of the first argument of the
addImagemethod results in CPU utilization and denial of service.If given the possibility to pass unsanitized image urls to the
addImagemethod, a user can provide a harmful data-url that results in high CPU utilization and denial of service.Other affected methods are:
html,addSvgAsImage.Example payload:
Patches
The vulnerability was fixed in jsPDF 3.0.1. Upgrade to jspdf@>=3.0.1
Workarounds
Sanitize image urls before passing it to the
addImagemethod or one of the other affected methods.Credits
Researcher: Aleksey Solovev (Positive Technologies)
CVE-2025-57810
Impact
User control of the first argument of the addImage method results in CPU utilization and denial of service.
If given the possibility to pass unsanitized image data or URLs to the addImage method, a user can provide a harmful PNG file that results in high CPU utilization and denial of service.
Other affected methods are:
html.Example payload:
Patches
The vulnerability was fixed in jsPDF 3.0.2. Upgrade to jspdf@>=3.0.2.
In jspdf@>=3.0.2, invalid PNG files throw an Error instead of causing very long running loops.
Workarounds
Sanitize image data or URLs before passing it to the addImage method or one of the other affected methods.
Credits
Researcher: Aleksey Solovev (Positive Technologies)
CVE-2025-68428
Impact
User control of the first argument of the loadFile method in the node.js build allows local file inclusion/path traversal.
If given the possibility to pass unsanitized paths to the loadFile method, a user can retrieve file contents of arbitrary files in the local file system the node process is running in. The file contents are included verbatim in the generated PDFs.
Other affected methods are:
addImage,html,addFont.Only the node.js builds of the library are affected, namely the
dist/jspdf.node.jsanddist/jspdf.node.min.jsfiles.Example attack vector:
Patches
The vulnerability has been fixed in [email protected]. This version restricts file system access per default. This semver-major update does not introduce other breaking changes.
Workarounds
With recent node versions, jsPDF recommends using the
--permissionflag in production. The feature was introduced experimentally in v20.0.0 and is stable since v22.13.0/v23.5.0/v24.0.0. See the node documentation for details.For older node versions, sanitize user-provided paths before passing them to jsPDF.
Credits
Researcher: kilkat (Kwangwoon Kim)
Release Notes
parallax/jsPDF (jspdf)
v4.0.0Compare Source
This release fixes a critical path traversal/local file inclusion security vulnerability in the jsPDF Node.js build. File system access is now restricted by default and can be enabled by either using node's
--permissionflag or the newjsPDF.allowFsReadproperty.There are no other breaking changes.
v3.0.4Compare Source
This release includes a bunch of bugfixes. Thanks to all contributors!
What's Changed
New Contributors
Full Changelog: parallax/jsPDF@v3.0.3...v3.1.0
v3.0.3Compare Source
This release fixes regressions with PNG encoding that were introduced in v3.0.2.
What's Changed
New Contributors
Full Changelog: parallax/jsPDF@v3.0.2...v3.0.3
v3.0.2Compare Source
This release fixes a security issue where parsing of corrupt PNG images could lead to long running loops and denial of service.
What's Changed
New Contributors
Full Changelog: parallax/jsPDF@v3.0.1...v3.0.2
v3.0.1Compare Source
This release fixes two security vulnerabilities:
addImagemethod and the methodshtmlandaddSvgAsImage, which depend onaddImagev3.0.0Compare Source
This major release officially drops support for Internet Explorer and fixes a security vulnerability in the
htmlfunction by updating the optional dependencydompurifyto v3.2.4. There are no other breaking changes.New Contributors
Full Changelog: parallax/jsPDF@v2.5.2...v3.0.0
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.