Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/libphp-phpmailer@1.73-6
purl pkg:deb/debian/libphp-phpmailer@1.73-6
Next non-vulnerable version 6.6.3-1
Latest non-vulnerable version 6.6.3-1
Risk 10.0
Vulnerabilities affecting this package (8)
Vulnerability Summary Fixed by
VCID-16kp-5zpw-fbha
Aliases:
CVE-2020-13625
GHSA-f7hx-fqxw-rvvj
Insufficient output escaping of attachment names in PHPMailer ### Impact CWE-116: Incorrect output escaping. An attachment added like this (note the double quote within the attachment name, which is entirely valid): $mail->addAttachment('/tmp/attachment.tmp', 'filename.html";.jpg'); Will result in a message containing these headers: Content-Type: application/octet-stream; name="filename.html";.jpg" Content-Disposition: attachment; filename="filename.html";.jpg" The attachment will be named `filename.html`, and the trailing `";.jpg"` will be ignored. Mail filters that reject `.html` attachments but permit `.jpg` attachments may be fooled by this. Note that the MIME type itself is obtained automatically from the *source filename* (in this case `attachment.tmp`, which maps to a generic `application/octet-stream` type), and not the *name* given to the attachment (though these are the same if a separate name is not provided), though it can be set explicitly in other parameters to attachment methods. ### Patches Patched in PHPMailer 6.1.6 by escaping double quotes within the name using a backslash, as per RFC822 section 3.4.1, resulting in correctly escaped headers like this: Content-Type: application/octet-stream; name="filename.html\";.jpg" Content-Disposition: attachment; filename="filename.html\";.jpg" ### Workarounds Reject or filter names and filenames containing double quote (`"`) characters before passing them to attachment functions such as `addAttachment()`. ### References [CVE-2020-13625](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-13625). [PHPMailer 6.1.6 release](https://github.com/PHPMailer/PHPMailer/releases/tag/v6.1.6) ### For more information If you have any questions or comments about this advisory: * Open an issue in [the PHPMailer repo](https://github.com/PHPMailer/PHPMailer/issues)
6.2.0-2
Affected by 1 other vulnerability.
VCID-4mjb-ur86-hkaz
Aliases:
CVE-2020-36326
GHSA-m298-fh5c-jc66
Object injection in PHPMailer/PHPMailer ### Impact This is a reintroduction of an earlier issue (CVE-2018-19296) by an unrelated bug fix in PHPMailer 6.1.8. An external file may be unexpectedly executable if it is used as a path to an attachment file via PHP's support for `.phar` files`. Exploitation requires that an attacker is able to provide an unfiltered path to a file to attach, or to trick calling code into generating one. See [this article](https://knasmueller.net/5-answers-about-php-phar-exploitation) for more info. ### Patches This issue was patched in the PHPMailer 6.4.1 release. This release also implements stricter filtering for attachment paths; paths that look like *any* kind of URL are rejected. ### Workarounds Validate paths to loaded files using the same pattern as used in [`isPermittedPath()`](https://github.com/PHPMailer/PHPMailer/blob/master/src/PHPMailer.php#L1815) before using them in *any* PHP file function, such as `file_exists`. This method can't be used directly because it is protected, but you can implement the same thing in calling code. Note that this should be applied to *all* user-supplied paths passed into such functions; it's not a problem specific to PHPMailer. ### Credit This issue was found by Fariskhi Vidyan, reported and managed via Tidelift.
6.2.0-2
Affected by 1 other vulnerability.
VCID-7kvh-8w1t-2kej
Aliases:
CVE-2015-8476
GHSA-738m-f33v-qc2r
Multiple CRLF injection vulnerabilities allow attackers to inject arbitrary SMTP commands via CRLF sequences in an email address to the `validateAddress` function in `class.phpmailer.php` or SMTP command to the `sendCommand` function in `class.smtp.php`.
5.1-1.1
Affected by 8 other vulnerabilities.
5.2.9+dfsg-2+deb8u3
Affected by 7 other vulnerabilities.
5.2.14+dfsg-2.3+deb9u1
Affected by 4 other vulnerabilities.
VCID-8msv-t7dq-qkd2
Aliases:
DSA-3750-2 libphp-phpmailer
regression update
5.2.9+dfsg-2+deb8u3
Affected by 7 other vulnerabilities.
VCID-cq4m-3q7u-cbg3
Aliases:
CVE-2016-10033
GHSA-5f37-gxvh-23v6
Remote code execution in PHPMailer ### Impact The `mailSend` function in the default `isMail` transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted `Sender` property. ### Patches Fixed in 5.2.18 ### Workarounds Filter and validate user input before passing it to internal functions. ### References https://nvd.nist.gov/vuln/detail/CVE-2016-10033 Related to a follow-on issue in https://nvd.nist.gov/vuln/detail/CVE-2016-10045 ### For more information If you have any questions or comments about this advisory: * Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer)
5.2.9+dfsg-2+deb8u3
Affected by 7 other vulnerabilities.
5.2.14+dfsg-2.3+deb9u1
Affected by 4 other vulnerabilities.
VCID-f585-qf89-f7f3
Aliases:
CVE-2018-19296
GHSA-7w4p-72j7-v7c2
Object injection PHPMailer is vulnerable to an object injection attack.
5.2.14+dfsg-2.3+deb9u1
Affected by 4 other vulnerabilities.
6.0.6-0.1
Affected by 2 other vulnerabilities.
VCID-ywsv-ddhg-b7es
Aliases:
CVE-2017-5223
GHSA-4x5h-cr29-fhp6
Local File Disclosure PHPMailer's `msgHTML` method applies transformations to an HTML document to make it usable as an email message body. One of the transformations is to convert relative image URLs into attachments using a script-provided base directory. If no base directory is provided, it resolves to `/`, meaning that relative image URLs get treated as absolute local file paths and added as attachments.
5.2.14+dfsg-2.3+deb9u1
Affected by 4 other vulnerabilities.
VCID-zju7-7wax-zfhz
Aliases:
CVE-2017-11503
GHSA-58mj-pw57-4vm2
XSS vulnerability in code example The `code_generator.phps` example does not filter user input prior to output. This file is distributed with a `.phps` extension, so it it not normally executable unless it is explicitly renamed, so it is safe by default. There's also an undisclosed potential XSS vulnerability in the default exception handler (unused by default).
6.0.6-0.1
Affected by 2 other vulnerabilities.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-k96h-dr15-ufhv PHPMailer Shell command injection PHPMailer before 1.7.4, when configured to use sendmail, allows remote attackers to execute arbitrary shell commands via shell metacharacters in the SendmailSend function in `class.phpmailer.php`. ### Impact Shell command injection, remotely exploitable if host application does not filter user data appropriately. ### Patches Fixed in 1.7.4 ### Workarounds Filter and validate user-supplied data before putting in the into the `Sender` property. ### References https://nvd.nist.gov/vuln/detail/CVE-2007-3215 ### For more information If you have any questions or comments about this advisory: * Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer) CVE-2007-3215
GHSA-6h78-85v2-mmch

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-15T23:18:28.046301+00:00 Debian Oval Importer Affected by VCID-ywsv-ddhg-b7es https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T22:38:43.271465+00:00 Debian Oval Importer Affected by VCID-zju7-7wax-zfhz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T20:42:33.659230+00:00 Debian Oval Importer Affected by VCID-16kp-5zpw-fbha https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T20:37:20.730756+00:00 Debian Oval Importer Affected by VCID-7kvh-8w1t-2kej https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T19:24:30.869139+00:00 Debian Oval Importer Fixing VCID-k96h-dr15-ufhv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T19:18:45.921667+00:00 Debian Oval Importer Affected by VCID-f585-qf89-f7f3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T18:26:22.584860+00:00 Debian Oval Importer Affected by VCID-cq4m-3q7u-cbg3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T16:49:37.140254+00:00 Debian Oval Importer Affected by VCID-4mjb-ur86-hkaz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T14:06:08.309349+00:00 Debian Oval Importer Affected by VCID-f585-qf89-f7f3 https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 38.4.0
2026-04-15T14:02:44.592254+00:00 Debian Oval Importer Affected by VCID-7kvh-8w1t-2kej https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 38.4.0
2026-04-15T13:47:45.481061+00:00 Debian Oval Importer Affected by VCID-cq4m-3q7u-cbg3 https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 38.4.0
2026-04-15T13:23:32.886720+00:00 Debian Oval Importer Affected by VCID-8msv-t7dq-qkd2 https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 38.4.0
2026-04-15T12:49:13.435746+00:00 Debian Oval Importer Affected by VCID-7kvh-8w1t-2kej https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 38.4.0
2026-04-11T22:54:06.527505+00:00 Debian Oval Importer Affected by VCID-ywsv-ddhg-b7es https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T22:15:28.853640+00:00 Debian Oval Importer Affected by VCID-zju7-7wax-zfhz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T20:23:36.160511+00:00 Debian Oval Importer Affected by VCID-16kp-5zpw-fbha https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T20:18:30.598885+00:00 Debian Oval Importer Affected by VCID-7kvh-8w1t-2kej https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T19:07:38.094721+00:00 Debian Oval Importer Fixing VCID-k96h-dr15-ufhv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T19:02:07.763525+00:00 Debian Oval Importer Affected by VCID-f585-qf89-f7f3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T18:11:25.291798+00:00 Debian Oval Importer Affected by VCID-cq4m-3q7u-cbg3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T16:36:24.286593+00:00 Debian Oval Importer Affected by VCID-4mjb-ur86-hkaz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T13:54:43.835212+00:00 Debian Oval Importer Affected by VCID-f585-qf89-f7f3 https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 38.3.0
2026-04-11T13:51:22.294423+00:00 Debian Oval Importer Affected by VCID-7kvh-8w1t-2kej https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 38.3.0
2026-04-11T13:36:28.771504+00:00 Debian Oval Importer Affected by VCID-cq4m-3q7u-cbg3 https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 38.3.0
2026-04-11T13:12:17.413946+00:00 Debian Oval Importer Affected by VCID-8msv-t7dq-qkd2 https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 38.3.0
2026-04-11T12:37:40.098265+00:00 Debian Oval Importer Affected by VCID-7kvh-8w1t-2kej https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 38.3.0
2026-04-08T22:28:31.764998+00:00 Debian Oval Importer Affected by VCID-ywsv-ddhg-b7es https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T21:51:47.721130+00:00 Debian Oval Importer Affected by VCID-zju7-7wax-zfhz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T20:04:12.478339+00:00 Debian Oval Importer Affected by VCID-16kp-5zpw-fbha https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T19:59:21.010534+00:00 Debian Oval Importer Affected by VCID-7kvh-8w1t-2kej https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T18:51:50.173641+00:00 Debian Oval Importer Fixing VCID-k96h-dr15-ufhv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T18:46:35.557118+00:00 Debian Oval Importer Affected by VCID-f585-qf89-f7f3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T17:57:45.376083+00:00 Debian Oval Importer Affected by VCID-cq4m-3q7u-cbg3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:27:12.979202+00:00 Debian Oval Importer Affected by VCID-4mjb-ur86-hkaz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T13:11:32.976455+00:00 Debian Oval Importer Affected by VCID-8msv-t7dq-qkd2 https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 38.1.0
2026-04-07T22:29:38.578753+00:00 Debian Oval Importer Affected by VCID-f585-qf89-f7f3 https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 38.1.0
2026-04-07T22:26:30.817268+00:00 Debian Oval Importer Affected by VCID-7kvh-8w1t-2kej https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 38.1.0
2026-04-07T22:12:05.583075+00:00 Debian Oval Importer Affected by VCID-cq4m-3q7u-cbg3 https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 38.1.0
2026-04-03T21:47:27.741891+00:00 Debian Oval Importer Affected by VCID-7kvh-8w1t-2kej https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 38.1.0
2026-04-02T12:53:30.638012+00:00 Debian Oval Importer Affected by VCID-7kvh-8w1t-2kej https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 38.0.0