First published: Wed Jul 26 2017(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/phpmailer/phpmailer | >=5.0.0<5.2.27>=6.0.0<6.0.6 | 6.0.6 |
composer/phpmailer/phpmailer | >=6.0.0<6.0.6 | 6.0.6 |
composer/phpmailer/phpmailer | >=5.0.0<5.2.27 | 5.2.27 |
Phpmailer Project Phpmailer | <5.2.27 | |
Phpmailer Project Phpmailer | >=6.0.0<6.0.6 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
WordPress WordPress | >=3.7<=5.7 | |
debian/libphp-phpmailer | 6.2.0-2 6.6.3-1 6.9.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the Object Injection vulnerability is CVE-2018-19296.
The severity of the Object Injection vulnerability is high with a severity value of 8.8.
The Object Injection vulnerability affects PHPMailer before 5.2.27 and 6.x before 6.0.6, as well as other packages and systems listed in the vulnerability description.
To fix the Object Injection vulnerability, update PHPMailer to version 5.2.27 or 6.0.6 and follow any additional remediation steps mentioned in the relevant advisories.
More information about the Object Injection vulnerability can be found on the official PHPMailer GitHub releases page, the Debian Security Tracker, and the MITRE CVE database.