CVE-2024-58303

Source
https://cve.org/CVERecord?id=CVE-2024-58303
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-58303.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-58303
Aliases
Published
2025-12-11T22:15:51.703Z
Modified
2026-03-13T21:49:13.413668Z
Severity
  • 8.6 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
[none]
Details

FoF Pretty Mail 1.1.2 contains a server-side template injection vulnerability that allows administrative users to inject malicious code into email templates. Attackers can execute system commands by inserting crafted template expressions that trigger arbitrary code execution during email generation.

References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-58303.json"