pdf-image has an OS Command Injection Vulnerability through its pdfFilePath parameter
Critical severity
GitHub Reviewed
Published
Mar 25, 2026
to the GitHub Advisory Database
•
Updated Mar 27, 2026
Description
Published by the National Vulnerability Database
Mar 25, 2026
Published to the GitHub Advisory Database
Mar 25, 2026
Reviewed
Mar 27, 2026
Last updated
Mar 27, 2026
pdf-image (npm package) through version 2.0.0 allows OS command injection via the pdfFilePath parameter. The constructGetInfoCommand and constructConvertCommandForPage functions use util.format() to interpolate user-controlled file paths into shell command strings that are executed via child_process.exec().
References