Description
DomPDF before version 2.0.0 is vulnerable to PHAR deserialization due to a lack of checking on the protocol before passing it into the file_get_contents() function. An attacker who can upload files of any type to the server can pass in the phar:// protocol to unserialize the uploaded file and instantiate arbitrary PHP objects. This can lead to remote code execution, especially when DOMPdf is used with frameworks with documented POP chains like Laravel or vulnerable developer code.
References (2)
Core 2
Core References
Exploit, Issue Tracking, Patch, Third Party Advisory
https://huntr.com/bounties/0bdddc12-ff67-4815-ab9f-6011a974f48e
Scores
CVSS v3
9.8
EPSS
0.0488
EPSS Percentile
89.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-502
Status
published
Products (2)
dompdf/dompdf
0 - 2.0.0Packagist
dompdf_project/dompdf
< 2.0.0
Published
Nov 15, 2024
Tracked Since
Feb 18, 2026