Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-k96h-dr15-ufhv
Vulnerability ID VCID-k96h-dr15-ufhv
Aliases CVE-2007-3215
GHSA-6h78-85v2-mmch
Summary PHPMailer Shell command injection PHPMailer before 1.7.4, when configured to use sendmail, allows remote attackers to execute arbitrary shell commands via shell metacharacters in the SendmailSend function in `class.phpmailer.php`. ### Impact Shell command injection, remotely exploitable if host application does not filter user data appropriately. ### Patches Fixed in 1.7.4 ### Workarounds Filter and validate user-supplied data before putting in the into the `Sender` property. ### References https://nvd.nist.gov/vuln/detail/CVE-2007-3215 ### For more information If you have any questions or comments about this advisory: * Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer)
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
epss 0.04403 https://api.first.org/data/v1/epss?cve=CVE-2007-3215
epss 0.04403 https://api.first.org/data/v1/epss?cve=CVE-2007-3215
epss 0.04403 https://api.first.org/data/v1/epss?cve=CVE-2007-3215
epss 0.04403 https://api.first.org/data/v1/epss?cve=CVE-2007-3215
epss 0.04403 https://api.first.org/data/v1/epss?cve=CVE-2007-3215
epss 0.04403 https://api.first.org/data/v1/epss?cve=CVE-2007-3215
epss 0.04403 https://api.first.org/data/v1/epss?cve=CVE-2007-3215
epss 0.04403 https://api.first.org/data/v1/epss?cve=CVE-2007-3215
epss 0.04403 https://api.first.org/data/v1/epss?cve=CVE-2007-3215
epss 0.04403 https://api.first.org/data/v1/epss?cve=CVE-2007-3215
generic_textual HIGH https://cxsecurity.com/issue/WLB-2007060063
generic_textual HIGH https://exchange.xforce.ibmcloud.com/vulnerabilities/34818
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-6h78-85v2-mmch
generic_textual HIGH https://github.com/PHPMailer/PHPMailer
cvssv3.1_qr HIGH https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-6h78-85v2-mmch
generic_textual HIGH https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-6h78-85v2-mmch
cvssv2 6.8 https://nvd.nist.gov/vuln/detail/CVE-2007-3215
generic_textual HIGH https://seclists.org/fulldisclosure/2011/Oct/223
generic_textual HIGH https://sourceforge.net/p/phpmailer/bugs/192
generic_textual HIGH https://web.archive.org/web/20070714054359/http://larholm.com/2007/06/11/phpmailer-0day-remote-execution
generic_textual HIGH https://yehg.net/lab/pr0js/advisories/%5BvTiger_5.2.1%5D_rce
Reference id Reference type URL
http://larholm.com/2007/06/11/phpmailer-0day-remote-execution/
http://osvdb.org/37206
http://osvdb.org/76139
https://api.first.org/data/v1/epss?cve=CVE-2007-3215
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3215
https://cxsecurity.com/issue/WLB-2007060063
http://seclists.org/fulldisclosure/2011/Oct/223
http://secunia.com/advisories/25626
http://secunia.com/advisories/25755
http://secunia.com/advisories/25758
http://securityreason.com/securityalert/2802
https://exchange.xforce.ibmcloud.com/vulnerabilities/34818
https://github.com/PHPMailer/PHPMailer
https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-6h78-85v2-mmch
http://sourceforge.net/project/shownotes.php?release_id=517428&group_id=157374
https://seclists.org/fulldisclosure/2011/Oct/223
https://sourceforge.net/p/phpmailer/bugs/192
https://sourceforge.net/p/phpmailer/bugs/192/
https://sourceforge.net/tracker/index.php?func=detail&aid=1734811&group_id=26031&atid=385707
https://web.archive.org/web/20070714054359/http://larholm.com/2007/06/11/phpmailer-0day-remote-execution
https://web.archive.org/web/20070714054359/http://larholm.com/2007/06/11/phpmailer-0day-remote-execution/
https://yehg.net/lab/pr0js/advisories/%5BvTiger_5.2.1%5D_rce
http://www.debian.org/security/2007/dsa-1315
http://www.securityfocus.com/archive/1/471065/100/0/threaded
http://www.securityfocus.com/bid/24417
http://www.vupen.com/english/advisories/2007/2161
http://www.vupen.com/english/advisories/2007/2267
http://yehg.net/lab/pr0js/advisories/%5BvTiger_5.2.1%5D_rce
429179 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=429179
429194 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=429194
cpe:2.3:a:phpmailer:phpmailer:1.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmailer:phpmailer:1.7:*:*:*:*:*:*:*
cpe:2.3:a:phpmailer:phpmailer:1.7.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmailer:phpmailer:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmailer:phpmailer:1.7.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmailer:phpmailer:1.7.2:*:*:*:*:*:*:*
cpe:2.3:a:phpmailer:phpmailer:1.7.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmailer:phpmailer:1.7.3:*:*:*:*:*:*:*
cpe:2.3:a:phpmailer:phpmailer:1.73:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmailer:phpmailer:1.73:*:*:*:*:*:*:*
CVE-2007-3215 https://nvd.nist.gov/vuln/detail/CVE-2007-3215
GHSA-6h78-85v2-mmch https://github.com/advisories/GHSA-6h78-85v2-mmch
USN-791-1 https://usn.ubuntu.com/791-1/
No exploits are available.
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2007-3215
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.88954
EPSS Score 0.04403
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:50:27.729148+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/02/GHSA-6h78-85v2-mmch/GHSA-6h78-85v2-mmch.json 38.0.0