Ad

CVE-2026-34071

MEDIUM CVSS 3.1: 6.1 EPSS 0.04%
Updated Mar 31, 2026
Stirling-Pdf
Parameter Value
CVSS 6.1 (MEDIUM)
Type CWE-79 (Cross-Site Scripting (XSS))
Vendor Stirling-Pdf
Public PoC No

Stirling-PDF is a locally hosted web application that allows you to perform various operations on PDF files. In version 2.7.3, the /api/v1/convert/eml/pdf endpoint with parameter downloadHtml=true returns unsanitized HTML from the email body with Content-Type: text/html. An attacker who sends a malicious email to a Stirling-PDF user can achieve JavaScript execution when that user exports the email using the "Download HTML intermediate file" feature.

Version 2.8.0 fixes the issue.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
None
No privileges needed
User Interaction
Required
User action required

Impact Assessment

Confidentiality
Low
Partial data leak
Integrity
Low
Partial data modification
Availability
None
No disruption

CVSS Vector v3.1

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Stirlingpdf Stirling_Pdf
cpe:2.3:a:stirlingpdf:stirling_pdf:2.7.3:*:*:*:*:*:*:*