SuperWebMailer 7.21.0.01526 is susceptible to a remote code execution vulnerability in the Language parameter of mailingupgrade.php. An unauthenticated remote attacker can exploit this behavior to execute arbitrary PHP code via Code Injection.
References
Link Resource
https://blog.to.com/advisory-superwebmailer-cve-2020-11546/ Exploit Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2020-07-14T19:16:21

Updated: 2020-07-14T19:16:21

Reserved: 2020-04-04T00:00:00


Link: CVE-2020-11546

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2020-07-14T20:15:11.347

Modified: 2021-07-21T11:39:23.747


Link: CVE-2020-11546

JSON object: View

cve-icon Redhat Information

No data.

CWE