VYPR
High severityNVD Advisory· Published Oct 7, 2011· Updated Apr 29, 2026

CVE-2010-4879

CVE-2010-4879

Description

PHP remote file inclusion vulnerability in dompdf.php in dompdf 0.6.0 beta1 allows remote attackers to execute arbitrary PHP code via a URL in the input_file parameter.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
dompdf/dompdfPackagist
>= 0.6, < 0.6.10.6.1

Affected products

1
  • cpe:2.3:a:digitaljunkies:dompdf:0.6.0:beta1:*:*:*:*:*:*

Patches

1
23a693993299

Remove pre-processing of PHP code, disallow I/O streams as file input

https://github.com/dompdf/dompdfbsweeneyMar 11, 2014via ghsa
2 files changed · +4 7
  • dompdf.php+4 0 modified
    @@ -227,6 +227,10 @@ function getoptions() {
         }
       }
       
    +  if($file_parts['protocol'] === 'php://') {
    +    throw new DOMPDF_Exception("Permission denied on $file. This script does not allow PHP streams.");
    +  }
    +  
       $outfile = "dompdf_out.pdf"; # Don't allow them to set the output file
       $save_file = false; # Don't save the file
       
    
  • include/dompdf.cls.php+0 7 modified
    @@ -580,13 +580,6 @@ function load_html($str, $encoding = null) {
           $str = substr($str, 3);
         }
     
    -    // Parse embedded php, first-pass
    -    if ( $this->get_option("enable_php") ) {
    -      ob_start();
    -      eval("?" . ">$str");
    -      $str = ob_get_clean();
    -    }
    -
         // if the document contains non utf-8 with a utf-8 meta tag chars and was 
         // detected as utf-8 by mbstring, problems could happen.
         // http://devzone.zend.com/article/8855
    

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

6

News mentions

0

No linked articles in our index yet.