We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-53860

Potential Abuse for Sending Arbitrary Emails in sp-php-email-handler



Description

sp-php-email-handler is a PHP package for handling contact form submissions. Messages sent using this script are vulnerable to abuse, as the script allows anybody to specify arbitrary email recipients and include user-provided content in confirmation emails. This could enable malicious actors to use your server to send spam, phishing emails, or other malicious content, potentially damaging your domain's reputation and leading to blacklisting by email providers. Patched in version 1.0.0 by removing user-provided content from confirmation emails. All pre-release versions (alpha and beta) are vulnerable to this issue and should not be used. There are no workarounds for this issue. Users must upgrade to version 1.0.0 to mitigate the vulnerability.

Reserved 2024-11-22 | Published 2024-11-27 | Updated 2024-12-02 | Assigner GitHub_M


HIGH: 8.6CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N

Problem types

CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Product status

< 1.0.0
affected

References

github.com/...er-PHP/security/advisories/GHSA-mj5r-x73q-fjw6

github.com/...ommit/6f00dd0d44ff27889aed2980a5ba06e60d83549d

cve.org (CVE-2024-53860)

nvd.nist.gov (CVE-2024-53860)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-53860

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.