<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-26830 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-26830/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 25 Mar 2026 15:16:38 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-26830/feed.xml" rel="self" type="application/rss+xml"/><item><title>pdf-image npm Package Command Injection Vulnerability (CVE-2026-26830)</title><link>https://feed.craftedsignal.io/briefs/2026-03-pdf-image-command-injection/</link><pubDate>Wed, 25 Mar 2026 15:16:38 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-pdf-image-command-injection/</guid><description>The pdf-image npm package through version 2.0.0 is vulnerable to OS command injection via the pdfFilePath parameter due to improper sanitization, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>The pdf-image npm package, up to version 2.0.0, contains a critical vulnerability (CVE-2026-26830) that allows for OS command injection. This vulnerability stems from the way the package handles user-provided file paths when processing PDF files. Specifically, the <code>constructGetInfoCommand</code> and <code>constructConvertCommandForPage</code> functions utilize <code>util.format()</code> to incorporate the <code>pdfFilePath</code> parameter directly into shell command strings. These commands are then executed using…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>npm</category><category>CVE-2026-26830</category><category>pdf</category></item></channel></rss>