mPDF 7.0 contains a local file inclusion vulnerability that allows attackers to read arbitrary system files by manipulating annotation file parameters. Attackers can generate URL-encoded or base64 payloads to include local files through crafted annotation content with file path specifications.
References
| Link | Resource |
|---|---|
| https://mpdf.github.io/ | Product |
| https://www.exploit-db.com/exploits/50995 | Exploit |
| https://www.vulncheck.com/advisories/mpdf-local-file-inclusion | Third Party Advisory |
Configurations
History
02 Feb 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
28 Jan 2026, 20:08
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://mpdf.github.io/ - Product | |
| References | () https://www.exploit-db.com/exploits/50995 - Exploit | |
| References | () https://www.vulncheck.com/advisories/mpdf-local-file-inclusion - Third Party Advisory | |
| CPE | cpe:2.3:a:mpdf_project:mpdf:7.0.0:-:*:*:*:*:*:* | |
| First Time |
Mpdf Project
Mpdf Project mpdf |
13 Jan 2026, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-13 23:15
Updated : 2026-02-02 16:16
NVD link : CVE-2022-50897
Mitre link : CVE-2022-50897
CVE.ORG link : CVE-2022-50897
JSON object : View
Products Affected
mpdf_project
- mpdf
CWE
CWE-98
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')
