Description
Stirling-PDF is a locally hosted web application that allows you to perform various operations on PDF files. In version 2.7.3, the /api/v1/convert/eml/pdf endpoint with parameter downloadHtml=true returns unsanitized HTML from the email body with Content-Type: text/html. An attacker who sends a malicious email to a Stirling-PDF user can achieve JavaScript execution when that user exports the email using the "Download HTML intermediate file" feature. Version 2.8.0 fixes the issue.
INFO
Published Date :
2026-03-26T17:00:08.783Z
Last Modified :
2026-03-26T19:52:10.821Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-34071 vulnerability.
| Vendors | Products |
|---|---|
| Stirlingpdf |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-34071.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact