FoF Pretty Mail 1.1.2 contains a local file inclusion vulnerability that allows administrative users to include arbitrary server files in email templates. Attackers can exploit the template settings by inserting file inclusion payloads to read sensitive system files like /etc/passwd during email generation.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 12 Dec 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Flarum
Flarum pretty Mail |
|
| Vendors & Products |
Flarum
Flarum pretty Mail |
Thu, 11 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | FoF Pretty Mail 1.1.2 contains a local file inclusion vulnerability that allows administrative users to include arbitrary server files in email templates. Attackers can exploit the template settings by inserting file inclusion payloads to read sensitive system files like /etc/passwd during email generation. | |
| Title | FoF Pretty Mail 1.1.2 Local File Inclusion via Email Template Settings | |
| Weaknesses | CWE-98 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-12-11T21:40:09.699Z
Reserved: 2025-12-11T00:58:28.457Z
Link: CVE-2024-58302
No data.
Status : Awaiting Analysis
Published: 2025-12-11T22:15:51.550
Modified: 2025-12-12T15:17:31.973
Link: CVE-2024-58302
No data.
OpenCVE Enrichment
Updated: 2025-12-12T08:49:14Z
Weaknesses