pdfmake is an open source client/server side PDF printing in pure JavaScript. In versions up to and including 0.2.5 pdfmake contains an unsafe evaluation of user controlled input. Users of pdfmake are thus subject to arbitrary code execution in the context of the process running the pdfmake code. There are no known fixes for this issue. Users are advised to restrict access to trusted user input.
References
| Link | Resource |
|---|---|
| https://github.com/bpampuch/pdfmake/blob/802813970ac6de68a0bd0931b74150b33da0dd18/dev-playground/server.js#L32 | Exploit Third Party Advisory |
| https://securitylab.github.com/advisories/GHSL-2022-068_pdfmake/ | Exploit Third Party Advisory |
| https://github.com/bpampuch/pdfmake/blob/802813970ac6de68a0bd0931b74150b33da0dd18/dev-playground/server.js#L32 | Exploit Third Party Advisory |
| https://securitylab.github.com/advisories/GHSL-2022-068_pdfmake/ | Exploit Third Party Advisory |
Configurations
History
20 Oct 2025, 15:56
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:pdfmake:pdfmake:*:*:*:*:*:*:*:* | |
| First Time |
Pdfmake pdfmake
Pdfmake |
21 Nov 2024, 07:30
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 10.0 |
| References | () https://github.com/bpampuch/pdfmake/blob/802813970ac6de68a0bd0931b74150b33da0dd18/dev-playground/server.js#L32 - Exploit, Third Party Advisory | |
| References | () https://securitylab.github.com/advisories/GHSL-2022-068_pdfmake/ - Exploit, Third Party Advisory |
07 Jul 2023, 19:04
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2022-12-06 19:15
Updated : 2025-10-20 15:56
NVD link : CVE-2022-46161
Mitre link : CVE-2022-46161
CVE.ORG link : CVE-2022-46161
JSON object : View
Products Affected
pdfmake
- pdfmake
CWE
