The isMail transport in PHPMailer before 5.2.20 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code by leveraging improper interaction between the escapeshellarg function and internal escaping performed in the mail function in PHP. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-10033.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-770-1 | libphp-phpmailer security update |
![]() |
DLA-770-2 | libphp-phpmailer regression update |
![]() |
DSA-3750-1 | libphp-phpmailer security update |
![]() |
DSA-3750-2 | libphp-phpmailer regression update |
![]() |
GHSA-4pc3-96mx-wwc8 | Remote code execution in PHPMailer |
![]() |
USN-5956-1 | PHPMailer vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sat, 12 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T03:07:32.139Z
Reserved: 2016-12-26T00:00:00
Link: CVE-2016-10045

No data.

Status : Deferred
Published: 2016-12-30T19:59:00.247
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-10045

No data.

No data.