-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| spipu/html2pdf | composer | < 5.2.8 | 5.2.8 |
The vulnerability exists in the example files (forms.php and example09.php) where user inputs like $_GET['nom'] and $_SERVER['REQUEST_URI'] were directly embedded into HTML output without proper escaping. However, these are inline scripts in example files, not specific functions within the library. The patches addressed these issues by removing dynamic URL construction and adding input sanitization. No specific library functions were identified as vulnerable; the issue lies in the example code's handling of user input.