High severityNVD Advisory· Published Oct 7, 2011· Updated Apr 29, 2026
CVE-2010-4879
CVE-2010-4879
Description
PHP remote file inclusion vulnerability in dompdf.php in dompdf 0.6.0 beta1 allows remote attackers to execute arbitrary PHP code via a URL in the input_file parameter.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
dompdf/dompdfPackagist | >= 0.6, < 0.6.1 | 0.6.1 |
Affected products
1Patches
123a693993299Remove pre-processing of PHP code, disallow I/O streams as file input
2 files changed · +4 −7
dompdf.php+4 −0 modified@@ -227,6 +227,10 @@ function getoptions() { } } + if($file_parts['protocol'] === 'php://') { + throw new DOMPDF_Exception("Permission denied on $file. This script does not allow PHP streams."); + } + $outfile = "dompdf_out.pdf"; # Don't allow them to set the output file $save_file = false; # Don't save the file
include/dompdf.cls.php+0 −7 modified@@ -580,13 +580,6 @@ function load_html($str, $encoding = null) { $str = substr($str, 3); } - // Parse embedded php, first-pass - if ( $this->get_option("enable_php") ) { - ob_start(); - eval("?" . ">$str"); - $str = ob_get_clean(); - } - // if the document contains non utf-8 with a utf-8 meta tag chars and was // detected as utf-8 by mbstring, problems could happen. // http://devzone.zend.com/article/8855
Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- www.exploit-db.com/exploits/14851nvdExploitWEB
- github.com/advisories/GHSA-48r9-4v93-x4whghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2010-4879ghsaADVISORY
- github.com/FriendsOfPHP/security-advisories/blob/master/dompdf/dompdf/CVE-2010-4879.yamlghsaWEB
- github.com/dompdf/dompdf/commit/23a693993299e669306929e3d49a4a1f7b3fb028ghsaWEB
- github.com/dompdf/dompdf/releases/tag/v0.6.2ghsaWEB
News mentions
0No linked articles in our index yet.