First published: Thu Mar 24 2022(Updated: )
Dompdf 1.2.1 allows remote code execution via a .php file in the src:url field of an @font-face Cascading Style Sheets (CSS) statement (within an HTML input file).
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/dompdf/dompdf | <1.2.1 | |
composer/dompdf/dompdf | <1.2.1 | 1.2.1 |
Dompdf | <1.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-28368 is a vulnerability that allows remote code execution in Dompdf before version 1.2.1 via a .php file in the src:url field of an @font-face CSS statement within an HTML input file.
CVE-2022-28368 has a severity rating of 9.8 out of 10, which is considered critical.
Dompdf before version 1.2.1 is affected by CVE-2022-28368.
To fix CVE-2022-28368, upgrade Dompdf to version 1.2.1 or higher.
You can find more information about CVE-2022-28368 on the following references: [GitHub Advisory](https://github.com/advisories/GHSA-x752-qjv4-c4hc), [NVD](https://nvd.nist.gov/vuln/detail/CVE-2022-28368), and [Dompdf GitHub issue](https://github.com/dompdf/dompdf/issues/2598).