### [CVE-2021-43691](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43691) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen) ### Description tripexpress v1.1 is affected by a path manipulation vulnerability in file system/helpers/dompdf/load_font.php. The variable src is coming from $_SERVER["argv"] then there is a path manipulation vulnerability. ### POC #### Reference - https://github.com/toocool/tripexpress/issues/40 #### Github No PoCs found on GitHub currently.