CVE-2016-10033
PHPMailer Command Injection Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
39Exploited in Wild
YesDecision
Descriptions
The mailSend function in the isMail transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted Sender property.
La función mailSend en el transporte isMail en PHPMailer en versiones anteriores a 5.2.18 podrían permitir a atacantes remotos pasar parámetros extra al comando mail y consecuentemente ejecutar código arbitrario a través de una \" (barra invertida comillas dobles) en una propiedad Sender manipulada.
Dawid Golunski discovered that PHPMailer was not properly escaping user input data used as arguments to functions executed by the system shell. An attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 16.04 ESM. It was discovered that PHPMailer was not properly escaping characters in certain fields of the code_generator.php example code. An attacker could possibly use this issue to conduct cross-site scripting attacks. This issue was only fixed in Ubuntu 16.04 ESM and Ubuntu 18.04 ESM.
PHPMailer contains a command injection vulnerability because it fails to sanitize user-supplied input. Specifically, this issue affects the 'mail()' function of 'class.phpmailer.php' script. An attacker can exploit this issue to execute arbitrary code within the context of the application. Failed exploit attempts will result in a denial-of-service condition.
CVSS Scores
SSVC
- Decision:Act
Timeline
- 2016-12-22 CVE Reserved
- 2016-12-26 CVE Published
- 2016-12-26 First Exploit
- 2025-07-07 Exploited in Wild
- 2025-07-28 KEV Due Date
- 2025-07-30 CVE Updated
- 2025-08-04 EPSS Updated
CWE
- CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CAPEC
References (46)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/archive/1/539963/100/0/threaded | Broken Link | |
http://www.securitytracker.com/id/1037533 | Broken Link | |
https://developer.joomla.org/security-centre/668-20161205-phpmailer-security-advisory.html | Third Party Advisory | |
https://www.drupal.org/psa-2016-004 | Third Party Advisory |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Phpmailer Project Search vendor "Phpmailer Project" | Phpmailer Search vendor "Phpmailer Project" for product "Phpmailer" | < 5.2.18 Search vendor "Phpmailer Project" for product "Phpmailer" and version " < 5.2.18" | - |
Affected
| ||||||
Wordpress Search vendor "Wordpress" | Wordpress Search vendor "Wordpress" for product "Wordpress" | <= 4.7 Search vendor "Wordpress" for product "Wordpress" and version " <= 4.7" | - |
Affected
| ||||||
Joomla Search vendor "Joomla" | Joomla\! Search vendor "Joomla" for product "Joomla\!" | >= 1.5.0 <= 3.6.5 Search vendor "Joomla" for product "Joomla\!" and version " >= 1.5.0 <= 3.6.5" | - |
Affected
|