Medium severity5.4NVD Advisory· Published Mar 26, 2026· Updated May 14, 2026
CVE-2026-34071
CVE-2026-34071
Description
Stirling-PDF is a locally hosted web application that allows you to perform various operations on PDF files. In version 2.7.3, the /api/v1/convert/eml/pdf endpoint with parameter downloadHtml=true returns unsanitized HTML from the email body with Content-Type: text/html. An attacker who sends a malicious email to a Stirling-PDF user can achieve JavaScript execution when that user exports the email using the "Download HTML intermediate file" feature. Version 2.8.0 fixes the issue.
Affected products
1- cpe:2.3:a:stirlingpdf:stirling_pdf:2.7.3:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/Stirling-Tools/Stirling-PDF/security/advisories/GHSA-xmhg-fv84-jgfcnvdExploitVendor Advisory
News mentions
0No linked articles in our index yet.