{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-13T05:02:32.131","vulnerabilities":[{"cve":{"id":"CVE-2026-26801","sourceIdentifier":"cve@mitre.org","published":"2026-03-10T19:17:17.430","lastModified":"2026-05-07T20:32:39.693","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Server-Side Request Forgery (SSRF) vulnerability in pdfmake versions 0.3.0-beta.2 through 0.3.5 allows a remote attacker to obtain sensitive information via the src/URLResolver.js component. The fix was released in version 0.3.6 which introduces the setUrlAccessPolicy() method allowing server operators to define URL access rules. A warning is now logged when pdfmake is used server-side without a policy configured."},{"lang":"es","value":"Vulnerabilidad de falsificación de petición del lado del servidor (SSRF) en las versiones de pdfmake 0.3.0-beta.2 hasta 0.3.5 permite a un atacante remoto obtener información sensible a través del componente src/URLResolver.js. La corrección fue lanzada en la versión 0.3.6, que introduce el método setUrlAccessPolicy() permitiendo a los operadores del servidor definir reglas de acceso a URL. Ahora se registra una advertencia cuando pdfmake se utiliza del lado del servidor sin una política configurada."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-918"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:pdfmake:pdfmake:*:*:*:*:*:*:*:*","versionStartIncluding":"0.3.1","versionEndIncluding":"0.3.5","matchCriteriaId":"E25A90CB-0990-4A86-A2A0-DED5B772A4F3"},{"vulnerable":true,"criteria":"cpe:2.3:a:pdfmake:pdfmake:0.3.0:-:*:*:*:*:*:*","matchCriteriaId":"B3D78BE8-BDF1-4F3D-A58B-6F72D92323E4"},{"vulnerable":true,"criteria":"cpe:2.3:a:pdfmake:pdfmake:0.3.0:beta10:*:*:*:*:*:*","matchCriteriaId":"6E9F434F-B222-4B9E-894F-EF27349FD85A"},{"vulnerable":true,"criteria":"cpe:2.3:a:pdfmake:pdfmake:0.3.0:beta11:*:*:*:*:*:*","matchCriteriaId":"302CBC0D-4021-43C9-9214-258EFAEBADA0"},{"vulnerable":true,"criteria":"cpe:2.3:a:pdfmake:pdfmake:0.3.0:beta12:*:*:*:*:*:*","matchCriteriaId":"813FC92B-1352-46B2-98E5-177F2774A2FF"},{"vulnerable":true,"criteria":"cpe:2.3:a:pdfmake:pdfmake:0.3.0:beta13:*:*:*:*:*:*","matchCriteriaId":"6998E01F-28D0-4110-9B73-051917FC1786"},{"vulnerable":true,"criteria":"cpe:2.3:a:pdfmake:pdfmake:0.3.0:beta14:*:*:*:*:*:*","matchCriteriaId":"3AE1D6C1-6D1F-40E2-A56B-D8975F41CF58"},{"vulnerable":true,"criteria":"cpe:2.3:a:pdfmake:pdfmake:0.3.0:beta15:*:*:*:*:*:*","matchCriteriaId":"A208BAFD-8F2C-4A30-87BC-9B9A4051113F"},{"vulnerable":true,"criteria":"cpe:2.3:a:pdfmake:pdfmake:0.3.0:beta16:*:*:*:*:*:*","matchCriteriaId":"3D03BA7A-C32D-4FBA-8A45-3BB1EDFAA456"},{"vulnerable":true,"criteria":"cpe:2.3:a:pdfmake:pdfmake:0.3.0:beta17:*:*:*:*:*:*","matchCriteriaId":"A23B1591-3E81-4340-9136-CC650FA68234"},{"vulnerable":true,"criteria":"cpe:2.3:a:pdfmake:pdfmake:0.3.0:beta18:*:*:*:*:*:*","matchCriteriaId":"D2DDEA62-21A3-408C-ABA5-E129F50F68CD"},{"vulnerable":true,"criteria":"cpe:2.3:a:pdfmake:pdfmake:0.3.0:beta19:*:*:*:*:*:*","matchCriteriaId":"7BAA4EC5-4994-4B5F-AE0A-0C1ABEF00861"},{"vulnerable":true,"criteria":"cpe:2.3:a:pdfmake:pdfmake:0.3.0:beta2:*:*:*:*:*:*","matchCriteriaId":"438BF14C-6B93-4D8C-BF7E-C7BA40E04595"},{"vulnerable":true,"criteria":"cpe:2.3:a:pdfmake:pdfmake:0.3.0:beta3:*:*:*:*:*:*","matchCriteriaId":"99C6EF3B-B002-4EB4-96DB-DFFFFED5570F"},{"vulnerable":true,"criteria":"cpe:2.3:a:pdfmake:pdfmake:0.3.0:beta4:*:*:*:*:*:*","matchCriteriaId":"60BC0F53-38A5-4BFD-95AC-47B7635BA52E"},{"vulnerable":true,"criteria":"cpe:2.3:a:pdfmake:pdfmake:0.3.0:beta5:*:*:*:*:*:*","matchCriteriaId":"5F25A975-45B3-4D96-A3DA-EF388D7C0C78"},{"vulnerable":true,"criteria":"cpe:2.3:a:pdfmake:pdfmake:0.3.0:beta6:*:*:*:*:*:*","matchCriteriaId":"50BDBDEA-E9AA-4D3D-B0C1-35552D2A6FE0"},{"vulnerable":true,"criteria":"cpe:2.3:a:pdfmake:pdfmake:0.3.0:beta7:*:*:*:*:*:*","matchCriteriaId":"8C08D75E-8340-4522-88C5-3871B461EA63"},{"vulnerable":true,"criteria":"cpe:2.3:a:pdfmake:pdfmake:0.3.0:beta8:*:*:*:*:*:*","matchCriteriaId":"FC47E00A-8A0D-4D66-BA63-9D9400584815"},{"vulnerable":true,"criteria":"cpe:2.3:a:pdfmake:pdfmake:0.3.0:beta9:*:*:*:*:*:*","matchCriteriaId":"76F34238-5ADD-4491-A01F-ECD62ECF10DB"}]}]}],"references":[{"url":"https://github.com/bpampuch/pdfmake","source":"cve@mitre.org","tags":["Product"]},{"url":"https://github.com/bpampuch/pdfmake/blob/master/src/URLResolver.js","source":"cve@mitre.org","tags":["Product"]},{"url":"https://github.com/bpampuch/pdfmake/pull/2920","source":"cve@mitre.org","tags":["Issue Tracking","Patch"]},{"url":"https://github.com/bpampuch/pdfmake/releases/tag/0.3.6","source":"cve@mitre.org","tags":["Release Notes"]},{"url":"https://mariopepe.github.io/cve-2026-26801-pdfmake-ssrf","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]}]}}]}