Description
mPDF through 7.1.6, if deployed as a web application that accepts arbitrary HTML, allows SSRF, as demonstrated by a '<img src="http://192.168' substring that triggers a call to getImage in Image/ImageProcessor.php. NOTE: the software maintainer disputes this, stating "If you allow users to pass HTML without sanitising it, you're asking for trouble.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
| Link | Providers |
|---|---|
| https://github.com/mpdf/mpdf/issues/867 |
|
History
Fri, 20 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T11:30:04.075Z
Reserved: 2018-11-06T00:00:00.000Z
Link: CVE-2018-19047
Updated: 2024-08-05T11:30:04.075Z
Status : Modified
Published: 2018-11-07T05:29:00.297
Modified: 2024-11-21T03:57:13.383
Link: CVE-2018-19047
No data.
OpenCVE Enrichment
No data.
Weaknesses