CVE-2025-11362

7.5 HIGH

📋 TL;DR

This vulnerability in pdfmake allows attackers to cause denial of service by embedding malicious URLs that trigger repeated redirects, consuming excessive resources. It affects applications using pdfmake versions before 0.3.0-beta.17 for PDF generation. Developers who embed user-controlled URLs in PDFs are particularly vulnerable.

💻 Affected Systems

Products:
  • pdfmake
Versions: All versions before 0.3.0-beta.17
Operating Systems: All platforms running Node.js applications
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects applications that use pdfmake's file embedding functionality with URL inputs.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete application crash and denial of service, potentially affecting all users of the vulnerable system.

🟠

Likely Case

Application becomes unresponsive or crashes when processing PDFs with malicious redirect URLs, disrupting PDF generation functionality.

🟢

If Mitigated

Limited impact with proper input validation and resource limits, potentially causing only temporary performance degradation.

🌐 Internet-Facing: HIGH - Attackers can exploit this remotely by submitting crafted PDF generation requests.
🏢 Internal Only: MEDIUM - Internal users could still trigger the vulnerability, but attack surface is reduced.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only the ability to provide URLs to the PDF generation function, which is often exposed to users.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.3.0-beta.17 and later

Vendor Advisory: https://github.com/bpampuch/pdfmake/commit/741169634bf07730e010cd77477b6cc038e846ed

Restart Required: No

Instructions:

1. Update pdfmake package to version 0.3.0-beta.17 or higher. 2. Run 'npm update pdfmake' or 'yarn upgrade pdfmake'. 3. Test PDF generation functionality.

🔧 Temporary Workarounds

Input Validation for URLs

all

Implement server-side validation to reject URLs with redirect chains or limit redirect depth.

Resource Limiting

all

Configure process timeouts and memory limits for PDF generation tasks.

🧯 If You Can't Patch

  • Disable URL embedding functionality in pdfmake configuration
  • Implement rate limiting and request validation for PDF generation endpoints

🔍 How to Verify

Check if Vulnerable:

Check package.json for pdfmake version. If version is below 0.3.0-beta.17 and application uses URL embedding, it's vulnerable.

Check Version:

npm list pdfmake | grep pdfmake

Verify Fix Applied:

After updating, verify the version is 0.3.0-beta.17 or higher and test PDF generation with various URL inputs.

📡 Detection & Monitoring

Log Indicators:

  • Multiple redirect errors in PDF generation logs
  • High memory or CPU usage during PDF processing
  • Failed PDF generation requests with timeout errors

Network Indicators:

  • Repeated HTTP redirect requests from PDF generation service
  • Unusually large number of PDF generation requests from single source

SIEM Query:

source="application.log" AND "pdfmake" AND ("redirect" OR "timeout" OR "memory")

🔗 References

📤 Share & Export