CVE-2020-36326Deserialization of Untrusted Data in Phpmailer

Severity
9.8CRITICALNVD
CNA8.8GHSA8.8OSV8.8
EPSS
0.3%
top 46.31%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 28
Latest updateMay 13

Description

PHPMailer 6.1.8 through 6.4.0 allows object injection through Phar Deserialization via addAttachment with a UNC pathname. NOTE: this is similar to CVE-2018-19296, but arose because 6.1.8 fixed a functionality problem in which UNC pathnames were always considered unreadable by PHPMailer, even in safe contexts. As an unintended side effect, this fix eliminated the code that blocked addAttachment exploitation.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

Packagistphpmailer/phpmailer6.1.86.4.1
NVDphpmailer_project/phpmailer6.1.86.4.0
NVDwordpress/wordpress3.73.7.36+20

Patches

🔴Vulnerability Details

4
GHSA
Object injection in PHPMailer/PHPMailer2021-05-04
OSV
Object injection in PHPMailer/PHPMailer2021-05-04
CVEList
CVE-2020-36326: PHPMailer 62021-04-28
OSV
CVE-2020-36326: PHPMailer 62021-04-28

📋Vendor Advisories

2
WordPress
WordPress 5.7.2 Security Release2021-05-13
Debian
CVE-2020-36326: libphp-phpmailer - PHPMailer 6.1.8 through 6.4.0 allows object injection through Phar Deserializati...2020
CVE-2020-36326 — Deserialization of Untrusted Data | cvebase