Attackers could inject arbitrary SMTP commands via by exploiting the fact that valid email addresses may contain line breaks, which are not handled correctly in some contexts.
Fixed in 5.2.14 in this commit.
Manually strip line breaks from email addresses before passing them to PHPMailer.
https://nvd.nist.gov/vuln/detail/CVE-2015-8476
If you have any questions or comments about this advisory: * Open a private issue in the PHPMailer project
{ "nvd_published_at": null, "cwe_ids": [ "CWE-20" ], "severity": "LOW", "github_reviewed": true, "github_reviewed_at": "2020-03-05T21:57:18Z" }