CVE-2026-26801

7.5 HIGH

📋 TL;DR

This Server-Side Request Forgery (SSRF) vulnerability in pdfmake allows attackers to make unauthorized requests from the server to internal or external systems, potentially exposing sensitive data. It affects server-side deployments of pdfmake versions 0.3.0-beta.2 through 0.3.5 that process untrusted PDF generation requests.

💻 Affected Systems

Products:
  • pdfmake
Versions: 0.3.0-beta.2 through 0.3.5
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects server-side deployments; client-side usage in browsers is not vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker accesses internal services, cloud metadata, or sensitive APIs, leading to data exfiltration, internal network reconnaissance, or secondary attacks on internal systems.

🟠

Likely Case

Information disclosure from internal services or cloud metadata endpoints, potentially exposing credentials, configuration data, or internal system information.

🟢

If Mitigated

Limited impact with proper URL access policies preventing unauthorized requests to sensitive endpoints.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SSRF vulnerabilities are commonly exploited; the vulnerability is in URL resolution logic that processes external resources.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.3.6

Vendor Advisory: https://github.com/bpampuch/pdfmake/releases/tag/0.3.6

Restart Required: No

Instructions:

1. Update pdfmake to version 0.3.6 or later. 2. Configure URL access policy using setUrlAccessPolicy() method. 3. Test PDF generation functionality.

🔧 Temporary Workarounds

Implement URL validation middleware

all

Add server-side validation to reject PDF generation requests containing suspicious URLs before they reach pdfmake.

Network segmentation

all

Restrict outbound network access from PDF generation servers to only necessary external services.

🧯 If You Can't Patch

  • Implement strict input validation to reject URLs pointing to internal IP ranges or sensitive endpoints.
  • Deploy web application firewall (WAF) rules to detect and block SSRF patterns in PDF generation requests.

🔍 How to Verify

Check if Vulnerable:

Check package.json or node_modules/pdfmake/package.json for version number between 0.3.0-beta.2 and 0.3.5.

Check Version:

npm list pdfmake | grep pdfmake

Verify Fix Applied:

Confirm version is 0.3.6+ and verify setUrlAccessPolicy() is configured in server-side code.

📡 Detection & Monitoring

Log Indicators:

  • Warning logs about missing URL access policy in pdfmake
  • Unusual outbound requests from PDF generation servers to internal IPs

Network Indicators:

  • HTTP requests from PDF servers to cloud metadata endpoints (169.254.169.254, etc.)
  • Requests to internal services from PDF generation systems

SIEM Query:

source="pdfmake" AND (message="*URL access policy*" OR message="*warning*" OR message="*ssrf*")

🔗 References

📤 Share & Export