CVE-2026-26831
EUVD-2026-1545925.03.2026, 16:16
textract through 2.5.0 is vulnerable to OS Command Injection via the file path parameter in multiple extractors. When processing files with malicious filenames, the filePath is passed directly to child_process.exec() in lib/extractors/doc.js, rtf.js, dxf.js, images.js, and lib/util.js with inadequate sanitizationEnginsight
Awaiting analysis
This vulnerability is currently awaiting analysis.
References