jsPDF is a library to generate PDFs in JavaScript. Prior to 4.1.0, user control of the first argument of the addMetadata function allows users to inject arbitrary XML. If given the possibility to pass unsanitized input to the addMetadata method, a user can inject arbitrary XMP metadata into the generated PDF. If the generated PDF is signed, stored or otherwise processed after, the integrity of the PDF can no longer be guaranteed. The vulnerability has been fixed in [email protected].
We have discovered 5,803 live websites that are affected by CVE-2026-24043.
| Product | |
| Category | JavaScript Libraries |
| Vulnerable Domains | 5,803 live websites (100% of jspdf install base) |
| Vulnerable Versions |
|
| Vulnerable Versions Count | 28 versions ( 100% of all versions) |
| 2,366 websites | |
| 313 websites | |
| 256 websites | |
| 237 websites | |
| 237 websites | |
| 208 websites | |
| 142 websites | |
| 135 websites | |
| 133 websites | |
| 129 websites |
| .com | 2,371 websites |
| .org | 416 websites |
| .com.br | 164 websites |
| .net | 156 websites |
| .de | 153 websites |
| .ru | 118 websites |
| .fr | 112 websites |
| .it | 108 websites |
| .nl | 100 websites |
| .co.uk | 99 websites |
| Domain | Country | Rank | Contacts |
|---|---|---|---|
| ****.org | **,*** | ||
| *************************.***.es | **,*** | ||
| *******.com | **,*** | ||
| ********.gov | **,*** | ||
| ***********.com | **,*** | ||
| ******.com | **,*** | ||
| *******.com | **,*** | ||
| **************.at | **,*** | ||
| *****.com | **,*** | ||
| ******.by | **,*** |
FAQ