PHPMailer 6.4.1 and earlier contain a vulnerability that can result in untrusted code being called (if such code is injected into the host project's scope by other means). If the $patternselect parameter to validateAddress() is set to 'php' (the default, defined by PHPMailer::$validator), and the global namespace contains a function called php, it will be called in preference to the built-in validator of the same name. Mitigated in PHPMailer 6.5.0 by denying the use of simple strings as validator function names.

Project Subscriptions

Vendors Products
Fedoraproject Subscribe
Phpmailer Project Subscribe
Phpmailer Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2021-1277 PHPMailer 6.4.1 and earlier contain a vulnerability that can result in untrusted code being called (if such code is injected into the host project's scope by other means). If the $patternselect parameter to validateAddress() is set to 'php' (the default, defined by PHPMailer::$validator), and the global namespace contains a function called php, it will be called in preference to the built-in validator of the same name. Mitigated in PHPMailer 6.5.0 by denying the use of simple strings as validator function names.
Github GHSA Github GHSA GHSA-77mr-wc79-m8j3 PHPMailer untrusted code may be run from an overridden address validator
Ubuntu USN Ubuntu USN USN-5956-1 PHPMailer vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: @huntrdev

Published:

Updated: 2024-08-03T17:01:07.074Z

Reserved: 2021-06-15T00:00:00

Link: CVE-2021-3603

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-06-17T12:15:08.150

Modified: 2024-11-21T06:21:57.330

Link: CVE-2021-3603

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses