Description

Stirling-PDF is a locally hosted web application that facilitates various operations on PDF files. In versions prior to 2.0.0, file upload endpoints render user-supplied filenames directly into HTML using unsafe methods like innerHTML without sanitization. An attacker can craft a file with a malicious filename containing JavaScript that executes in the uploading user's browser context, resulting in reflected XSS. The issue affects numerous upload endpoints across the application. The issue has been fixed in version 2.0.0.

INFO

Published Date :

2026-04-17T20:29:43.262Z

Last Modified :

2026-04-20T16:20:16.137Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-33436 vulnerability.

Vendors Products
Stirlingpdf
  • Stirling Pdf
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-33436.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact