{"schema_version":"1.7.2","id":"OESA-2026-2147","modified":"2026-05-03T09:56:07Z","published":"2026-05-03T09:56:07Z","upstream":["CVE-2026-33929"],"summary":"pdfbox security update","details":"Apache PDFBox is an open source Java PDF library for working with PDF documents. This project allows creation of new PDF documents, manipulation of existing documents and the ability to extract content from documents. Apache PDFBox also includes several command line utilities. Apache PDFBox is published under the Apache License v2.0.\r\n\r\nSecurity Fix(es):\n\nImproper Limitation of a Pathname to a Restricted Directory (&apos;Path Traversal&apos;) vulnerability in Apache PDFBox Examples.\n\nThis issue affects the \nExtractEmbeddedFiles example in Apache PDFBox: from 2.0.24 through 2.0.36, from 3.0.0 through 3.0.7.\n\n\nUsers are recommended to update to version 2.0.37 or 3.0.8 once \navailable. Until then, they should apply the fix provided in GitHub PR \n427.\n\nThe ExtractEmbeddedFiles example contained a path traversal vulnerability (CWE-22) mentioned in CVE-2026-23907. However the change in the releases 2.0.36 and 3.0.7 is flawed because it doesn&apos;t consider the file path separator. Because of that, a user having writing rights on /home/ABC could be victim to a malicious PDF resulting in a write attempt to any path starting with /home/ABC, e.g. &quot;/home/ABCDEF&quot;.\n\nUsers who have copied this example into their production code should apply the mentioned change. The example \nhas been changed accordingly and is available in the project repository.(CVE-2026-33929)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS","name":"pdfbox","purl":"pkg:rpm/openEuler/pdfbox&distro=openEuler-24.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.0.29-2.oe2403"}]}],"ecosystem_specific":{"noarch":["fontbox-2.0.29-2.oe2403.noarch.rpm","pdfbox-2.0.29-2.oe2403.noarch.rpm","pdfbox-debugger-2.0.29-2.oe2403.noarch.rpm","pdfbox-javadoc-2.0.29-2.oe2403.noarch.rpm","pdfbox-parent-2.0.29-2.oe2403.noarch.rpm","pdfbox-reactor-2.0.29-2.oe2403.noarch.rpm","pdfbox-tools-2.0.29-2.oe2403.noarch.rpm","preflight-2.0.29-2.oe2403.noarch.rpm","xmpbox-2.0.29-2.oe2403.noarch.rpm"],"src":["pdfbox-2.0.29-2.oe2403.src.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2147"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-33929"}],"database_specific":{"severity":"Medium"}}
