Description

textract through 2.5.0 is vulnerable to OS Command Injection via the file path parameter in multiple extractors. When processing files with malicious filenames, the filePath is passed directly to child_process.exec() in lib/extractors/doc.js, rtf.js, dxf.js, images.js, and lib/util.js with inadequate sanitization

INFO

Published Date :

2026-03-25T00:00:00.000Z

Last Modified :

2026-03-28T01:12:59.787Z

Source :

mitre
AFFECTED PRODUCTS

The following products are affected by CVE-2026-26831 vulnerability.

Vendors Products
Dbashford
  • Textract

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact