Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1tajVyLXg3M3EtZmp3Ns4ABB4d

SPEmailHandler-PHP has Potential Abuse for Sending Arbitrary Emails

Impact

Messages sent using this script are vulnerable to abuse, as the script allows anybody to specify arbitrary email recipients and include user-provided content in confirmation emails. This could enable malicious actors to use your server to send spam, phishing emails, or other malicious content, potentially damaging your domain's reputation and leading to blacklisting by email providers.

Patches

Patched in version 1.0.0 by removing user-provided content from confirmation emails. All pre-release versions (alpha and beta) are vulnerable to this issue and should not be used.

Workarounds

There are no workarounds for this issue. Users must upgrade to version 1.0.0 to mitigate the vulnerability.

Permalink: https://github.com/advisories/GHSA-mj5r-x73q-fjw6
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1tajVyLXg3M3EtZmp3Ns4ABB4d
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 13 days ago
Updated: 9 days ago


CVSS Score: 8.6
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N

EPSS Percentage: 0.00043
EPSS Percentile: 0.10511

Identifiers: GHSA-mj5r-x73q-fjw6, CVE-2024-53860
References: Repository: https://github.com/Spencer14420/SPEmailHandler-PHP
Blast Radius: 1.0

Affected Packages

packagist:spencer14420/sp-php-email-handler
Dependent packages: 0
Dependent repositories: 0
Downloads: 80 total
Affected Version Ranges: < 1.0.0
Fixed in: 1.0.0
All affected versions:
All unaffected versions: 1.0.0, 1.0.1