Untriaged
Permalink
CVE-2026-33438
6.5 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
Stirling-PDF vulnerable to DoS via add-watermark
Stirling-PDF is a locally hosted web application that allows you to perform various operations on PDF files. Versions starting in 2.1.5 and prior to 2.5.2 have Denial of Service (DoS) vulnerability in the Stirling-PDF watermark functionality (`/api/v1/security/add-watermark` endpoint). The vulnerability allows authenticated users to cause resource exhaustion and server crashes by providing extreme values for the `fontSize` and `widthSpacer` parameters. Version 2.5.2 patches the issue.
References
-
https://github.com/Stirling-Tools/Stirling-PDF/security/advisories/GHSA-3932-2rfq-87xm exploitx_refsource_CONFIRM
Affected products
Stirling-PDF
- ==>= 2.1.5, < 2.5.2
Matching in nixpkgs
pkgs.stirling-pdf
Locally hosted web application that allows you to perform various operations on PDF files
pkgs.stirling-pdf-desktop
Powerful, open-source PDF editing platform runnable as a desktop app
Package maintainers
-
@TomaSajt TomaSajt