Arbitrary local file inclusion via the $lang
property, remotely exploitable if host application passes unfiltered user data into that property. The 3 CVEs listed are applications that used PHPMailer that were vulnerable to this problem.
It's not known exactly when this was fixed in the host applications, but it was fixed in PHPMailer 5.2.0.
Filter and validate user-supplied data before use.
https://nvd.nist.gov/vuln/detail/CVE-2006-5734 https://nvd.nist.gov/vuln/detail/CVE-2007-3215 https://nvd.nist.gov/vuln/detail/CVE-2007-2021 Example exploit: https://www.exploit-db.com/exploits/14893
If you have any questions or comments about this advisory: * Open a private issue in the PHPMailer project
{ "nvd_published_at": null, "cwe_ids": [], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2024-02-02T20:43:57Z" }