Stirling-PDF is a locally hosted web application that facilitates various operations on PDF files. In versions prior to 2.0.0, file upload endpoints render user-supplied filenames directly into HTML using unsafe methods like innerHTML without sanitization. An attacker can craft a file with a malicious filename containing JavaScript that executes in the uploading user's browser context, resulting in reflected XSS. The issue affects numerous upload endpoints across the application. The issue has been fixed in version 2.0.0.

Project Subscriptions

Vendors Products
Stirlingpdf Subscribe
Stirling Pdf Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 13 May 2026 16:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:stirlingpdf:stirling_pdf:*:*:*:*:*:*:*:*

Mon, 20 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 20 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Stirlingpdf
Stirlingpdf stirling Pdf
Vendors & Products Stirlingpdf
Stirlingpdf stirling Pdf

Fri, 17 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Description Stirling-PDF is a locally hosted web application that facilitates various operations on PDF files. In versions prior to 2.0.0, file upload endpoints render user-supplied filenames directly into HTML using unsafe methods like innerHTML without sanitization. An attacker can craft a file with a malicious filename containing JavaScript that executes in the uploading user's browser context, resulting in reflected XSS. The issue affects numerous upload endpoints across the application. The issue has been fixed in version 2.0.0.
Title Stirling-PDF: Reflected XSS through crafted filename in file upload functionality
Weaknesses CWE-116
CWE-20
CWE-79
References
Metrics cvssV3_1

{'score': 3.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-20T16:20:16.137Z

Reserved: 2026-03-19T18:45:22.436Z

Link: CVE-2026-33436

cve-icon Vulnrichment

Updated: 2026-04-20T16:20:07.677Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-17T21:16:32.750

Modified: 2026-05-13T16:00:07.763

Link: CVE-2026-33436

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T14:59:38Z

Weaknesses