Описание
SuperWebMailer 7.21.0.01526 is susceptible to a remote code execution vulnerability in the Language parameter of mailingupgrade.php. An unauthenticated remote attacker can exploit this behavior to execute arbitrary PHP code via Code Injection.
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 7.40.0.01550 (исключая)
cpe:2.3:a:superwebmailer:superwebmailer:*:*:*:*:*:*:*:*
EPSS
Процентиль: 100%
0.93122
Критический
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-94
Связанные уязвимости
github
больше 3 лет назад
SuperWebMailer 7.21.0.01526 is susceptible to a remote code execution vulnerability in the Language parameter of mailingupgrade.php. An unauthenticated remote attacker can exploit this behavior to execute arbitrary PHP code via Code Injection.
EPSS
Процентиль: 100%
0.93122
Критический
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-94