漏洞描述 Superwebmailer是一个基于 Web 的 PHP 通讯软件,用于通讯收件人管理,发送 HTML 通讯,生日电子邮件。SuperWebMailer7.21.0.01526版本中的mailingupgrade.php文件的‘Language’参数存在注入漏洞。攻击者可利用该漏洞执行任意的PHP代码。
相关漏洞推荐 CVE-2020-11546: SuperWebmailer 7.21.0.01526 - Remote Code Execution POC 2025-08-01 | SuperWebmailer SuperWebMailer 7.21.0.01526 is susceptible to a remote code execution vulnerability in the Language ... CVE-2023-38192: SuperWebMailer 9.00.0.01710 - Cross-Site Scripting POC 2025-08-01 | SuperWebMailer An issue was discovered in SuperWebMailer 9.00.0.01710 allowing XSS via crafted incorrect passwords.... CVE-2023-38194: SuperWebMailer - Cross-Site Scripting POC 2025-08-01 | SuperWebMailer An issue was discovered in SuperWebMailer 9.00.0.01710 that allows keepalive.php XSS via a GET param... CVE-2020-10199: Nexus Repository before 3.21.2 allows JavaEL Injection POC 2025-09-01 | Nexus Repository 漏洞触发需要任意账户权限 body="Nexus Repository Manager" app="Nexus-Repository-Manager" CVE-2020-11455: LimeSurvey 4.1.11 - Path Traversal POC 2025-09-01 | LimeSurvey LimeSurvey before 4.1.12+200324 contains a path traversal vulnerability in application/controllers/a...