CVE-2016-10033

critical-risk
Published 2016-12-30

The mailSend function in the isMail transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted Sender property.

Do I need to act?

!
94.5% chance of exploitation in next 30 days
EPSS score — higher than 6% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
!
9 public exploits available
41962, 41996, 42024 and 6 more
+
Fix available
Upgrade to: ed4e7ce8ad877a8f578139c491c256ab1933c7c9
9
CVSS 9.8/10 Critical
NETWORK / LOW complexity

Affected Products (3)

75
/ 100
critical-risk
Severity 32/34 · Critical
Exploitability 34/34 · Critical
Exposure 9/34 · Low