// For flags

CVE-2016-10033

PHPMailer Command Injection Vulnerability

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

39
*Multiple Sources

Exploited in Wild

Yes
*KEV

Decision

Act
*SSVC
Descriptions

The mailSend function in the isMail transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted Sender property.

La función mailSend en el transporte isMail en PHPMailer en versiones anteriores a 5.2.18 podrían permitir a atacantes remotos pasar parámetros extra al comando mail y consecuentemente ejecutar código arbitrario a través de una \" (barra invertida comillas dobles) en una propiedad Sender manipulada.

Dawid Golunski discovered that PHPMailer was not properly escaping user input data used as arguments to functions executed by the system shell. An attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 16.04 ESM. It was discovered that PHPMailer was not properly escaping characters in certain fields of the code_generator.php example code. An attacker could possibly use this issue to conduct cross-site scripting attacks. This issue was only fixed in Ubuntu 16.04 ESM and Ubuntu 18.04 ESM.

PHPMailer contains a command injection vulnerability because it fails to sanitize user-supplied input. Specifically, this issue affects the 'mail()' function of 'class.phpmailer.php' script. An attacker can exploit this issue to execute arbitrary code within the context of the application. Failed exploit attempts will result in a denial-of-service condition.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:Act
Exploitation
Active
Automatable
Yes
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2016-12-22 CVE Reserved
  • 2016-12-26 CVE Published
  • 2016-12-26 First Exploit
  • 2025-07-07 Exploited in Wild
  • 2025-07-28 KEV Due Date
  • 2025-07-30 CVE Updated
  • 2025-08-04 EPSS Updated
CWE
  • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CAPEC
References (46)
URL Date SRC
https://packetstorm.news/files/id/142486 2017-05-12
https://packetstorm.news/files/id/140283 2016-12-27
https://packetstorm.news/files/id/140286 2016-12-28
https://packetstorm.news/files/id/142390 2017-05-05
https://packetstorm.news/files/id/142547 2017-05-17
https://packetstorm.news/files/id/140349 2017-01-03
https://packetstorm.news/files/id/140291 2016-12-29
https://packetstorm.news/files/id/140280 2016-12-26
https://packetstorm.news/files/id/140350 2017-01-04
https://www.exploit-db.com/exploits/42221 2025-07-30
https://www.exploit-db.com/exploits/42024 2025-07-30
https://www.exploit-db.com/exploits/41996 2025-07-30
https://www.exploit-db.com/exploits/41962 2025-07-30
https://www.exploit-db.com/exploits/40986 2025-07-30
https://www.exploit-db.com/exploits/40974 2025-07-30
https://www.exploit-db.com/exploits/40969 2025-07-30
https://www.exploit-db.com/exploits/40968 2025-07-30
https://www.exploit-db.com/exploits/40970 2025-07-30
https://github.com/opsxcq/exploit-CVE-2016-10033 2019-10-13
https://github.com/GeneralTesler/CVE-2016-10033 2017-05-10
https://github.com/chipironcin/CVE-2016-10033 2017-06-12
https://github.com/0x00-0x00/CVE-2016-10033 2018-02-09
https://github.com/ElnurBDa/CVE-2016-10033 2024-05-16
https://github.com/Bajunan/CVE-2016-10033 2017-05-19
https://github.com/j4k0m/CVE-2016-10033 2021-08-31
https://github.com/Astrowmist/POC-CVE-2016-10033 2024-06-06
https://github.com/zeeshanbhattined/exploit-CVE-2016-10033 2019-10-13
https://github.com/liusec/WP-CVE-2016-10033 2017-07-22
https://github.com/Zenexer/safeshell 2020-03-26
https://github.com/pedro823/cve-2016-10033-45 2018-09-29
https://github.com/awidardi/opsxcq-cve-2016-10033 2018-12-06
https://github.com/cved-sources/cve-2016-10033 2021-04-15
https://github.com/eb613819/CTF_CVE-2016-10033 2022-12-09
https://github.com/sealldeveloper/CVE-2016-10033-PoC 2025-04-25
http://packetstormsecurity.com/files/140291/PHPMailer-Remote-Code-Execution.html 2025-07-30
http://packetstormsecurity.com/files/140350/PHPMailer-Sendmail-Argument-Injection.html 2025-07-30
http://www.rapid7.com/db/modules/exploit/multi/http/phpmailer_arg_injection 2025-07-30
http://www.securityfocus.com/bid/95108 2025-07-30
https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html 2025-07-30
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Phpmailer Project
Search vendor "Phpmailer Project"
Phpmailer
Search vendor "Phpmailer Project" for product "Phpmailer"
< 5.2.18
Search vendor "Phpmailer Project" for product "Phpmailer" and version " < 5.2.18"
-
Affected
Wordpress
Search vendor "Wordpress"
Wordpress
Search vendor "Wordpress" for product "Wordpress"
<= 4.7
Search vendor "Wordpress" for product "Wordpress" and version " <= 4.7"
-
Affected
Joomla
Search vendor "Joomla"
Joomla\!
Search vendor "Joomla" for product "Joomla\!"
>= 1.5.0 <= 3.6.5
Search vendor "Joomla" for product "Joomla\!" and version " >= 1.5.0 <= 3.6.5"
-
Affected