Dependency-Check is an open source tool performing a best effort analysis of 3rd party dependencies; false positives and false negatives may exist in the analysis performed by the tool. Use of the tool and the reporting provided constitutes acceptance for use in an AS IS condition, and there are NO warranties, implied or otherwise, with regard to the analysis or its use. Any use of the tool and the reporting provided is at the user’s risk. In no event shall the copyright holder or OWASP be held liable for any damages whatsoever arising out of or in connection with the use of this tool, the analysis performed, or the resulting report.

How to read the report | Suppressing false positives | Getting Help: github issues

Project: dependencies

org.openspcoop2:org.openspcoop2.dependencies:1.0

Scan Information:

Summary

Dependency Vulnerability IDs Package Highest Severity CVE Count Confidence Evidence Count
pdfbox-2.0.34.jar cpe:2.3:a:apache:pdfbox:2.0.34:*:*:*:*:*:*:* pkg:maven/org.apache.pdfbox/pdfbox@2.0.34 MEDIUM 1 Highest 33

Dependencies

pdfbox-2.0.34.jar

Description:

        The Apache PDFBox library is an open source Java tool for working with PDF documents.
    

License:

https://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /var/lib/jenkins/.m2/repository/org/apache/pdfbox/pdfbox/2.0.34/pdfbox-2.0.34.jar
MD5: 040922643ee4bec07da09c68374c4ad7
SHA1: b281d4339844e7614e425e84c2570687b18dc4ba
SHA256:c3a4915ee4252c8010583267e5b8eeb9fa1b093fdf95151ea27f394da7793572
Referenced In Project/Scope: dependencies.pdf:compile
pdfbox-2.0.34.jar is in the transitive dependency tree of the listed items.Included by: pkg:maven/org.openspcoop2/org.openspcoop2.pdf@1.0

Identifiers

Published Vulnerabilities

CVE-2026-23907

This issue affects the 
ExtractEmbeddedFiles example in Apache PDFBox: from 2.0.24 through 2.0.35, from 3.0.0 through 3.0.6.


The ExtractEmbeddedFiles example contains a path traversal vulnerability (CWE-22) because 
the filename that is obtained from 
PDComplexFileSpecification.getFilename() is appended to the extraction path.

Users who have copied this example into their production code should 
review it to ensure that the extraction path is acceptable. The example 
has been changed accordingly, now the initial path and the extraction 
paths are converted into canonical paths and it is verified that 
extraction path contains the initial path. The documentation has also 
been adjusted.
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CVSSv3:
References:

Vulnerable Software & Versions:



This report contains data retrieved from the National Vulnerability Database.
This report may contain data retrieved from the CISA Known Exploited Vulnerability Catalog.
This report may contain data retrieved from the Github Advisory Database (via NPM Audit API).
This report may contain data retrieved from RetireJS.
This report may contain data retrieved from the Sonatype OSS Index.