Description
The isMail transport in PHPMailer before 5.2.20 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code by leveraging improper interaction between the escapeshellarg function and internal escaping performed in the mail function in PHP. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-10033.
Published: 2016-12-30
Score: 9.8 Critical
EPSS: 93.4% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-770-1 libphp-phpmailer security update
Debian DLA Debian DLA DLA-770-2 libphp-phpmailer regression update
Debian DSA Debian DSA DSA-3750-1 libphp-phpmailer security update
Debian DSA Debian DSA DSA-3750-2 libphp-phpmailer regression update
Github GHSA Github GHSA GHSA-4pc3-96mx-wwc8 Remote code execution in PHPMailer
Ubuntu USN Ubuntu USN USN-5956-1 PHPMailer vulnerabilities
History

Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.93786}

epss

{'score': 0.93812}


Subscriptions

Joomla Joomla\!
Phpmailer Project Phpmailer
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T03:07:32.139Z

Reserved: 2016-12-26T00:00:00.000Z

Link: CVE-2016-10045

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2016-12-30T19:59:00.247

Modified: 2025-04-12T10:46:40.837

Link: CVE-2016-10045

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses