Vulnerability Description
pdf-image (npm package) through version 2.0.0 allows OS command injection via the pdfFilePath parameter. The constructGetInfoCommand and constructConvertCommandForPage functions use util.format() to interpolate user-controlled file paths into shell command strings that are executed via child_process.exec()
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pdf-Image Project | Pdf-Image | <= 2.0.0 |
Related Weaknesses (CWE)
References
- https://github.com/mooz/node-pdf-imageProduct
- https://github.com/zebbernCVE/CVE-2026-26830ExploitThird Party Advisory
- https://www.npmjs.com/package/pdf-imageProduct
FAQ
What is CVE-2026-26830?
CVE-2026-26830 is a vulnerability with a CVSS score of 9.8 (CRITICAL). pdf-image (npm package) through version 2.0.0 allows OS command injection via the pdfFilePath parameter. The constructGetInfoCommand and constructConvertCommandForPage functions use util.format() to i...
How severe is CVE-2026-26830?
CVE-2026-26830 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-26830?
Check the references section above for vendor advisories and patch information. Affected products include: Pdf-Image Project Pdf-Image.