Search for vulnerabilities
Vulnerability ID | VCID-6t22-awsw-fybd |
Aliases |
CVE-2015-8476
GHSA-738m-f33v-qc2r |
Summary | SMTP Injection in PHPMailer ### Impact Attackers could inject arbitrary SMTP commands via by exploiting the fact that valid email addresses may contain line breaks, which are not handled correctly in some contexts. ### Patches Fixed in 5.2.14 in [this commit](https://github.com/PHPMailer/PHPMailer/commit/6687a96a18b8f12148881e4ddde795ae477284b0). ### Workarounds Manually strip line breaks from email addresses before passing them to PHPMailer. ### References https://nvd.nist.gov/vuln/detail/CVE-2015-8476 ### For more information If you have any questions or comments about this advisory: * Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer) |
Status | Published |
Exploitability | 0.5 |
Weighted Severity | 2.7 |
Risk | 1.4 |
Affected and Fixed Packages | Package Details |
Percentile | 0.7539 |
EPSS Score | 0.00948 |
Published At | July 30, 2025, 12:55 p.m. |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
2025-07-31T08:47:40.672977+00:00 | GithubOSV Importer | Import | https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/03/GHSA-738m-f33v-qc2r/GHSA-738m-f33v-qc2r.json | 37.0.0 |