CVE-2021-3603

PHPMailer 6.4.1 and earlier contain a vulnerability that can result in untrusted code being called (if such code is injected into the host project's scope by other means). If the $patternselect parameter to validateAddress() is set to 'php' (the default, defined by PHPMailer::$validator), and the global namespace contains a function called php, it will be called in preference to the built-in validator of the same name. Mitigated in PHPMailer 6.5.0 by denying the use of simple strings as validator function names.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.1 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
@huntrdevCNA
8.1 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 57%
VendorProductVersion
phpmailer_projectphpmailer
𝑥
≤ 6.4.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libphp-phpmailer
bullseye
no-dsa
buster
no-dsa
stretch
postponed
bookworm
6.6.3-1
fixed
sid
6.9.1-1
fixed
trixie
6.9.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libphp-phpmailer
noble
not-affected
mantic
not-affected
lunar
not-affected
kinetic
not-affected
jammy
Fixed 6.2.0-2ubuntu0.1~esm1
released
impish
ignored
hirsute
ignored
groovy
ignored
focal
Fixed 6.0.6-0.1ubuntu0.1~esm1
released
bionic
not-affected
xenial
not-affected
trusty
dne