Remote Code Execution in DHTMLX Gantt and Scheduler PDF Export Module
CVE-2026-41553
10CRITICAL
What is CVE-2026-41553?
The PDF Export Module in DHTMLX's Gantt and Scheduler products is susceptible to a Remote Code Execution vulnerability due to insufficient sanitization of the 'data' parameter. This flaw allows unauthenticated attackers to inject malicious JavaScript code, which is processed by Node.js and executed on the server. If exploited, an attacker could potentially gain control over the server, leading to serious security breaches. This vulnerability has been addressed in the PDF Export Module version 0.7.6.
Affected Version(s)
PDF Export Module 0.3.3 < 0.7.6
References
CVSS V4
Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Łukasz Jaworski (Pentest Limited)
Tomasz Holeksa (Pentest Limited)
