CVE-2016-10033

PHP · PHP PHPMailer

A critical, actively exploited command injection vulnerability in PHPMailer allows an unauthenticated remote attacker to execute arbitrary code on the affected server, leading to a complete system com.

Executive summary

A critical, actively exploited command injection vulnerability in PHPMailer allows an unauthenticated remote attacker to execute arbitrary code on the affected server, leading to a complete system compromise.**

Vulnerability

An unauthenticated attacker can inject malicious shell commands into parameters used by the PHPMailer library. When the application processes an email, these commands are executed by the underlying mail transfer agent, resulting in remote code execution on the server.

Business impact

With a CVSS score of 9.5 (Critical), a successful exploit allows for a full system compromise. An attacker could exfiltrate sensitive data, install ransomware, or use the compromised server to launch further attacks against the internal network. The inclusion of this vulnerability in the CISA Known Exploited Vulnerabilities (KEV) catalog confirms it is being actively exploited and represents a severe and immediate threat to the business.

Remediation

Immediate Action: Apply all vendor-supplied patches and mitigations immediately. Per CISA's Binding Operational Directive (BOD) 22-01, federal agencies must remediate this vulnerability by July 27, 2025.

Proactive Monitoring: Review web server and application logs for suspicious POST requests to email-sending functions. Monitor for unexpected processes spawned by the web server's user account.

Compensating Controls: Implement a Web Application Firewall (WAF) with strict rules to detect and block command injection patterns. This can serve as a virtual patch if immediate updates are not feasible.

Exploitation status

Public Exploit Available: Yes

Analyst recommendation

Given the critical severity and confirmed active exploitation, immediate remediation is mandatory. The risk of server compromise, data breach, and operational disruption is severe. All administrators must prioritize the application of vendor patches to fully mitigate this threat before the federal deadline.