When using the zend-mail component to send email via the Zend\Mail\Transport\Sendmail transport, a malicious user may be able to inject arbitrary parameters to the system sendmail program. The attack is performed by providing additional quote characters within an address; when unsanitized, they can be interpreted as additional command line arguments, leading to the vulnerability.
{
"nvd_published_at": null,
"severity": "MODERATE",
"github_reviewed_at": "2024-06-07T20:47:30Z",
"github_reviewed": true,
"cwe_ids": [
"CWE-74"
]
}