{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-01T09:44:45.649","vulnerabilities":[{"cve":{"id":"CVE-2026-33438","sourceIdentifier":"security-advisories@github.com","published":"2026-03-26T17:16:40.657","lastModified":"2026-03-31T21:37:52.353","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Stirling-PDF is a locally hosted web application that allows you to perform various operations on PDF files. Versions starting in 2.1.5 and prior to 2.5.2 have Denial of Service (DoS) vulnerability in the Stirling-PDF watermark functionality (`/api/v1/security/add-watermark` endpoint). The vulnerability allows authenticated users to cause resource exhaustion and server crashes by providing extreme values for the `fontSize` and `widthSpacer` parameters. Version 2.5.2 patches the issue."},{"lang":"es","value":"Stirling-PDF es una aplicación web alojada localmente que permite realizar diversas operaciones en archivos PDF. Las versiones a partir de la 2.1.5 y anteriores a la 2.5.2 tienen una vulnerabilidad de denegación de servicio (DoS) en la funcionalidad de marca de agua de Stirling-PDF (punto de conexión '/api/v1/security/add-watermark'). La vulnerabilidad permite a usuarios autenticados causar agotamiento de recursos y caídas del servidor al proporcionar valores extremos para los parámetros 'fontSize' y 'widthSpacer'. La versión 2.5.2 corrige el problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-770"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:stirling:stirling_pdf:*:*:*:*:*:*:*:*","versionStartIncluding":"2.1.5","versionEndExcluding":"2.5.2","matchCriteriaId":"19BCD243-291F-4708-83E5-CF7EF5041B9D"}]}]}],"references":[{"url":"https://github.com/Stirling-Tools/Stirling-PDF/security/advisories/GHSA-3932-2rfq-87xm","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://github.com/Stirling-Tools/Stirling-PDF/security/advisories/GHSA-3932-2rfq-87xm","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Vendor Advisory"]}]}}]}