GHSA-vpr4-p6fq-85jcHigh

Snappy: Binary path is never shell-escaped due to an inverted is_executable check

Published
May 21, 2026
Last Modified
May 21, 2026

🔗 CVE IDs covered (1)

📋 Description

### Impact On POSIX, escapeshellarg(‘/usr/bin/wkhtmltopdf’) returns the literal string ‘/usr/bin/wkhtmltopdf’ with the single-quote characters included. is_executable() then looks for a file whose actual name contains those quote characters, which essentially never exists. The safe branch is dead code and $command always falls through to the raw, unescaped value. The rest of the arguments (options, input, output) are escaped correctly, so injection has to land in the binary string itself. That happens whenever the binary path is sourced from configuration that is user-influenced, derived from environment variables that ultimately come from request data, or concatenated with any user-controlled fragment. #### Proof of concept: ```php $pdf = new Knp\Snappy\Pdf(‘wkhtmltopdf; touch /tmp/snappy_rce’); $pdf->generate(‘https://example.com’, ‘/tmp/out.pdf’); // /tmp/snappy_rce is created. ``` **Impact:** command execution as the PHP process when the binary path is attacker-influenced. Even in deployments where the binary is hard-coded, this is a defensive-in-depth regression: downstream packages reasonably assume Snappy shell-escapes the binary because the code looks like it does. ### Patches The version 1.7.1 will resolve this security advisory. ### Workarounds Before calling the constructor, ensure `\is_executable($path)` is truthy. ```php // Bad example $pdf = new Knp\Snappy\Pdf('/path/to/binary'); ``` ```php // Better example $pathToBinary = '/path/to/binary'; if (!\is_executable($pathToBinary)) { throw new \RuntimeException(); } $pdf = new Knp\Snappy\Pdf('/path/to/binary'); ```

🎯 Affected products1

  • composer/KnpLabs/knp-snappy:<= 1.7.0

🔗 References (2)