CVE-2023-50252

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-50252
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-50252.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-50252
Aliases
  • GHSA-jq98-9543-m4cr
Downstream
Published
2023-12-12T20:39:17.905Z
Modified
2025-12-05T00:12:43.900335Z
Severity
  • 8.3 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L CVSS Calculator
Summary
php-svg-lib unsafe attributes merge when parsing `use` tag
Details

php-svg-lib is an SVG file parsing / rendering library. Prior to version 0.5.1, when handling <use> tag that references an <image> tag, it merges the attributes from the <use> tag to the <image> tag. The problem pops up especially when the href attribute from the <use> tag has not been sanitized. This can lead to an unsafe file read that can cause PHAR Deserialization vulnerability in PHP prior to version 8. Version 0.5.1 contains a patch for this issue.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-15",
        "CWE-502"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/50xxx/CVE-2023-50252.json"
}
References

Affected packages

Git / github.com/dompdf/php-svg-lib

Affected ranges

Type
GIT
Repo
https://github.com/dompdf/php-svg-lib
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.3.4
0.4.0
0.4.1
0.5.0

v0.*

v0.1
v0.2
v0.3
v0.3.0
v0.3.1
v0.3.2
v0.3.3