Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. swiftmailer/swiftmailer
  4. ›
  5. GHSA-4qpj-gxxg-jqg4

GHSA-4qpj-gxxg-jqg4: Swiftmailer Sendmail transport arbitrary shell execution

May 29, 2024

Prior to 5.2.1, the sendmail transport (Swift_Transport_SendmailTransport) was vulnerable to an arbitrary shell execution if the “From” header came from a non-trusted source and no “Return-Path” is configured. This has been fixed in 5.2.1. If you are using sendmail as a transport, you are encouraged to upgrade as soon as possible.

References

  • github.com/FriendsOfPHP/security-advisories/blob/master/swiftmailer/swiftmailer/2014-06-13.yaml
  • github.com/advisories/GHSA-4qpj-gxxg-jqg4
  • github.com/swiftmailer/swiftmailer
  • github.com/swiftmailer/swiftmailer/commit/b4b78af55e5e87f5ff07c06c6be7963c44562f80
  • github.com/swiftmailer/swiftmailer/commit/efc430606a5faed864b969adfbdc5363ce2115a2
  • web.archive.org/web/20150219063146/http://blog.swiftmailer.org/post/88660759928/security-fix-swiftmailer-5-2-1-released

Code Behaviors & Features

Detect and mitigate GHSA-4qpj-gxxg-jqg4 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 4.0.0 before 5.2.1

Fixed versions

  • 5.2.1

Solution

Upgrade to version 5.2.1 or above.

Source file

packagist/swiftmailer/swiftmailer/GHSA-4qpj-gxxg-jqg4.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:06 +0000.