Vulnerability Description
An issue was discovered in TCPDF before 6.8.0. unserializeTCPDFtag uses != (aka loose comparison) and does not use a constant-time function to compare TCPDF tag hashes.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tcpdf Project | Tcpdf | < 6.8.0 |
Related Weaknesses (CWE)
References
- https://github.com/tecnickcom/TCPDF/commit/d54b97cec33f4f1a5ad81119a82085cad93cePatch
- https://github.com/tecnickcom/TCPDF/compare/6.7.8...6.8.0Issue Tracking
- https://tcpdf.orgProduct
- https://www.php.net/manual/en/types.comparisons.phpNot Applicable
- https://lists.debian.org/debian-lts-announce/2025/06/msg00004.html
FAQ
What is CVE-2024-56522?
CVE-2024-56522 is a vulnerability with a CVSS score of 7.5 (HIGH). An issue was discovered in TCPDF before 6.8.0. unserializeTCPDFtag uses != (aka loose comparison) and does not use a constant-time function to compare TCPDF tag hashes.
How severe is CVE-2024-56522?
CVE-2024-56522 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-56522?
Check the references section above for vendor advisories and patch information. Affected products include: Tcpdf Project Tcpdf.