First published: Fri Jun 10 2022(Updated: )
A vulnerability was found in PHPList 3.2.6. It has been classified as critical. Affected is an unknown function of the file /lists/admin/ of the component Sending Campain. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.3.1 is able to address this issue. It is recommended to upgrade the affected component.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
phpList | =3.2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-20030 is classified as critical due to its potential for remote SQL injection.
To fix CVE-2017-20030, update your PHPList installation to a version higher than 3.2.6 that addresses this vulnerability.
CVE-2017-20030 affects the Sending Campaign component located in the /lists/admin/ directory of PHPList.
Yes, CVE-2017-20030 can be exploited remotely, making it a significant security risk.
CVE-2017-20030 is a SQL injection vulnerability that allows attackers to manipulate database queries.