Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2026-41553— Remote Code Execution in PDF Export Module

AI Predicted 9.8 Difficulty: Easy EPSS 0.25% · P49

Possible ATT&CK Techniques 1AI

T1190 · Exploit Public-Facing Application

Affected Version Matrix 1

VendorProductVersion RangeStatus
DHTMLXPDF Export Module0.3.3< 0.7.6affected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-41553

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Remote Code Execution in PDF Export Module
Source: NVD (National Vulnerability Database)
Vulnerability Description
PDF Export Module used in DHTMLX's products Gantt and Scheduler is vulnerable to Remote Code Execution due to lack of "data" parameter sanitization. An unauthenticated attacker can inject the malicious JavaScript code to the parameter whose value is processed by Node.js and subsequently executed. This can lead to server compromise. This issue was fixed in PDF Export Module version 0.7.6.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
DHTMLX Gantt 操作系统命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
DHTMLX Gantt是DHTMLX公司的一款支持项目计划、任务调度与时间线可视化的JavaScript甘特图组件。 DHTMLX Gantt 0.7.6之前版本存在操作系统命令注入漏洞,该漏洞源于缺乏data参数清理,可能导致未经身份验证的攻击者向参数注入恶意JavaScript代码,该代码由Node.js处理并随后执行,可能导致服务器被攻陷。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
DHTMLXPDF Export Module 0.3.3 ~ 0.7.6 -

II. Public POCs for CVE-2026-41553

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-41553

登录查看更多情报信息。

Same Patch Batch · DHTMLX · 2026-05-15 · 3 CVEs total

CVE-2026-41552Path Traversal in PDF Export Module
CVE-2026-7182Path Traversal in Diagram

IV. Related Vulnerabilities

V. Comments for CVE-2026-41553

No comments yet


Leave a comment