Update dependency jspdf to v3 [SECURITY]#1910
Open
renovate[bot] wants to merge 1 commit intostagingfrom
Open
Conversation
6bd8246 to
cbbc43e
Compare
cbbc43e to
dc175ea
Compare
dc175ea to
a0cb617
Compare
a0cb617 to
5440718
Compare
5440718 to
d49e001
Compare
d49e001 to
38509ea
Compare
38509ea to
594886c
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
2.5.1→3.0.1GitHub Vulnerability Alerts
CVE-2025-29907
Impact
User control of the first argument of the
addImagemethod results in CPU utilization and denial of service.If given the possibility to pass unsanitized image urls to the
addImagemethod, a user can provide a harmful data-url that results in high CPU utilization and denial of service.Other affected methods are:
html,addSvgAsImage.Example payload:
Patches
The vulnerability was fixed in jsPDF 3.0.1. Upgrade to jspdf@>=3.0.1
Workarounds
Sanitize image urls before passing it to the
addImagemethod or one of the other affected methods.Credits
Researcher: Aleksey Solovev (Positive Technologies)
Release Notes
parallax/jsPDF (jspdf)
v3.0.1Compare Source
This release fixes two security vulnerabilities:
addImagemethod and the methodshtmlandaddSvgAsImage, which depend onaddImagev3.0.0Compare Source
This major release officially drops support for Internet Explorer and fixes a security vulnerability in the
htmlfunction by updating the optional dependencydompurifyto v3.2.4. There are no other breaking changes.New Contributors
Full Changelog: parallax/jsPDF@v2.5.2...v3.0.0
v2.5.2Compare Source
This release upgrades the Dompurify dependency to 2.5.4 with fixes a vulnerability with high severity: GHSA-mmhx-hmjr-r674.
It also upgrades fflate, core-js, and @babel/runtime to more recent versions.
What's Changed
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.