textract through 2.5.0 is vulnerable to OS Command Injection via the file path parameter in multiple extractors. When processing files with malicious filenames, the filePath is passed directly to child_process.exec() in lib/extractors/doc.js, rtf.js, dxf.js, images.js, and lib/util.js with inadequate sanitization
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 26 Mar 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | OS Command Injection via Malicious File Paths in textract Package | |
| Weaknesses | CWE-20 CWE-78 |
Thu, 26 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dbashford
Dbashford textract |
|
| Vendors & Products |
Dbashford
Dbashford textract |
Wed, 25 Mar 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | OS Command Injection via Malicious File Paths in textract Package | |
| Weaknesses | CWE-20 CWE-78 |
Wed, 25 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | textract through 2.5.0 is vulnerable to OS Command Injection via the file path parameter in multiple extractors. When processing files with malicious filenames, the filePath is passed directly to child_process.exec() in lib/extractors/doc.js, rtf.js, dxf.js, images.js, and lib/util.js with inadequate sanitization | |
| References |
|
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-03-25T15:52:03.946Z
Reserved: 2026-02-16T00:00:00.000Z
Link: CVE-2026-26831
No data.
Status : Awaiting Analysis
Published: 2026-03-25T16:16:21.123
Modified: 2026-03-26T15:13:15.790
Link: CVE-2026-26831
No data.
OpenCVE Enrichment
Updated: 2026-03-26T12:18:40Z
Weaknesses
No weakness.