dompdf_project CVE Vulnerabilities & Metrics

Focus on dompdf_project vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About dompdf_project Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with dompdf_project. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total dompdf_project CVEs: 12
Earliest CVE date: 10 Jan 2020, 06:15 UTC
Latest CVE date: 15 Nov 2024, 11:15 UTC

Latest CVE reference: CVE-2021-3902

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 2

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical dompdf_project CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 2.27

Max CVSS: 7.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 7
4.0-6.9 4
7.0-8.9 1
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS dompdf_project CVEs

These are the five CVEs with the highest CVSS scores for dompdf_project, sorted by severity first and recency.

All CVEs for dompdf_project

CVE-2021-3902 dompdf_project vulnerability CVSS: 0 15 Nov 2024, 11:15 UTC

An improper restriction of external entities (XXE) vulnerability in dompdf/dompdf's SVG parser allows for Server-Side Request Forgery (SSRF) and deserialization attacks. This issue affects all versions prior to 2.0.0. The vulnerability can be exploited even if the isRemoteEnabled option is set to false. It allows attackers to perform SSRF, disclose internal image files, and cause PHAR deserialization attacks.

CVE-2021-3838 dompdf_project vulnerability CVSS: 0 15 Nov 2024, 11:15 UTC

DomPDF before version 2.0.0 is vulnerable to PHAR deserialization due to a lack of checking on the protocol before passing it into the file_get_contents() function. An attacker who can upload files of any type to the server can pass in the phar:// protocol to unserialize the uploaded file and instantiate arbitrary PHP objects. This can lead to remote code execution, especially when DOMPdf is used with frameworks with documented POP chains like Laravel or vulnerable developer code.

CVE-2023-50262 dompdf_project vulnerability CVSS: 0 13 Dec 2023, 21:15 UTC

Dompdf is an HTML to PDF converter for PHP. When parsing SVG images Dompdf performs an initial validation to ensure that paths within the SVG are allowed. One of the validations is that the SVG document does not reference itself. However, prior to version 2.0.4, a recursive chained using two or more SVG documents is not correctly validated. Depending on the system configuration and attack pattern this could exhaust the memory available to the executing process and/or to the server itself. php-svg-lib, when run in isolation, does not support SVG references for `image` elements. However, when used in combination with Dompdf, php-svg-lib will process SVG images referenced by an `image` element. Dompdf currently includes validation to prevent self-referential `image` references, but a chained reference is not checked. A malicious actor may thus trigger infinite recursion by chaining references between two or more SVG images. When Dompdf parses a malicious payload, it will crash due after exceeding the allowed execution time or memory usage. An attacker sending multiple request to a system can potentially cause resource exhaustion to the point that the system is unable to handle incoming request. Version 2.0.4 contains a fix for this issue.

CVE-2023-24813 dompdf_project vulnerability CVSS: 0 07 Feb 2023, 19:15 UTC

Dompdf is an HTML to PDF converter written in php. Due to the difference in the attribute parser of Dompdf and php-svg-lib, an attacker can still call arbitrary URLs with arbitrary protocols. Dompdf parses the href attribute of `image` tags and respects `xlink:href` even if `href` is specified. However, php-svg-lib, which is later used to parse the svg file, parses the href attribute. Since `href` is respected if both `xlink:href` and `href` is specified, it's possible to bypass the protection on the Dompdf side by providing an empty `xlink:href` attribute. An attacker can exploit the vulnerability to call arbitrary URLs with arbitrary protocols if they provide an SVG file to the Dompdf. In PHP versions before 8.0.0, it leads to arbitrary unserialize, which will lead, at the very least, to arbitrary file deletion and might lead to remote code execution, depending on available classes. This vulnerability has been addressed in commit `95009ea98` which has been included in release version 2.0.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2023-23924 dompdf_project vulnerability CVSS: 0 01 Feb 2023, 00:15 UTC

Dompdf is an HTML to PDF converter. The URI validation on dompdf 2.0.1 can be bypassed on SVG parsing by passing `<image>` tags with uppercase letters. This may lead to arbitrary object unserialize on PHP < 8, through the `phar` URL wrapper. An attacker can exploit the vulnerability to call arbitrary URL with arbitrary protocols, if they can provide a SVG file to dompdf. In PHP versions before 8.0.0, it leads to arbitrary unserialize, that will lead to the very least to an arbitrary file deletion and even remote code execution, depending on classes that are available.

CVE-2022-41343 dompdf_project vulnerability CVSS: 0 25 Sep 2022, 19:15 UTC

registerFont in FontMetrics.php in Dompdf before 2.0.1 allows remote file inclusion because a URI validation failure does not halt font registration, as demonstrated by a @font-face rule.

CVE-2022-2400 dompdf_project vulnerability CVSS: 0 18 Jul 2022, 15:15 UTC

External Control of File Name or Path in GitHub repository dompdf/dompdf prior to 2.0.0.

CVE-2022-0085 dompdf_project vulnerability CVSS: 4.3 28 Jun 2022, 15:15 UTC

Server-Side Request Forgery (SSRF) in GitHub repository dompdf/dompdf prior to 2.0.0.

CVE-2022-28368 dompdf_project vulnerability CVSS: 7.5 03 Apr 2022, 03:15 UTC

Dompdf 1.2.1 allows remote code execution via a .php file in the src:url field of an @font-face Cascading Style Sheets (CSS) statement (within an HTML input file).

CVE-2014-5013 dompdf_project vulnerability CVSS: 6.8 10 Jan 2020, 06:15 UTC

DOMPDF before 0.6.2 allows remote code execution, a related issue to CVE-2014-2383.

CVE-2014-5012 dompdf_project vulnerability CVSS: 4.3 10 Jan 2020, 06:15 UTC

DOMPDF before 0.6.2 allows denial of service.

CVE-2014-5011 dompdf_project vulnerability CVSS: 4.3 10 Jan 2020, 06:15 UTC

DOMPDF before 0.6.2 allows Information Disclosure.