CVE-2009-2095

Mundi Mail 0.8.2 - RCE

Title source: llm
STIX 2.1

Description

PHP remote file inclusion vulnerability in template/simpledefault/admin/_masterlayout.php in Mundi Mail 0.8.2, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the top parameter. NOTE: when allow_url_fopen is disabled, directory traversal attacks are possible to include and execute arbitrary local files.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Br0ly · textwebappsphp
https://www.exploit-db.com/exploits/8948

References (1)

Core 1
Core References
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/8948

Scores

EPSS 0.0160
EPSS Percentile 81.8%

Details

CWE
CWE-94
Status published
Products (1)
mundi_king/mundi_mail 0.8.2
Published Jun 17, 2009
Tracked Since Feb 18, 2026