CVE-2016-10033
The mailSend function in the isMail transport in PHPMailer before
Description
Description
The mailSend function in the isMail transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted Sender property.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Affected Vendors & Products
| Vendor | Product | Version |
|---|---|---|
| phpmailer_project | phpmailer | From 8.3.0 (inc) to 8.3.12 (inc) |
| wordpress | wordpress | From 5.7 (inc) to 5.7.5 (inc) |
| joomla | joomla\! | From 1.5.0 (inc) to 3.6.5 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-88 | The product constructs a string for a command to be executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
How can this vulnerability impact me? :
How can this vulnerability be detected on my network or system? Can you suggest some commands?
What immediate steps should I take to mitigate this vulnerability?
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart
Meta Information
CVE Publication Date:
2016-12-30
CVE Last Modified Date:
2025-10-22
Report Generation Date:
2025-11-23
AI Powered Q&A Generation:
2025-07-08
EPSS Last Evaluated Date:
2025-08-20
NVD Report Link: