Skip to content

Swiftmailer Sendmail transport arbitrary shell execution

Critical severity GitHub Reviewed Published May 29, 2024 to the GitHub Advisory Database • Updated May 29, 2024

Package

composer swiftmailer/swiftmailer (Composer)

Affected versions

>= 4.0.0, < 5.2.1

Patched versions

5.2.1

Description

Prior to 5.2.1, the sendmail transport (Swift_Transport_SendmailTransport) was vulnerable to an arbitrary shell execution if the "From" header came from a non-trusted source and no "Return-Path" is configured. This has been fixed in 5.2.1. If you are using sendmail as a transport, you are encouraged to upgrade as soon as possible.

References

Published to the GitHub Advisory Database May 29, 2024
Reviewed May 29, 2024
Last updated May 29, 2024

Severity

Critical

Weaknesses

No CWEs

CVE ID

No known CVE

GHSA ID

GHSA-4qpj-gxxg-jqg4
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.