Description
PHP remote file inclusion vulnerability in template/simpledefault/admin/_masterlayout.php in Mundi Mail 0.8.2, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the top parameter. NOTE: when allow_url_fopen is disabled, directory traversal attacks are possible to include and execute arbitrary local files.
Exploits (1)
References (1)
Core 1
Core References
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/8948
Scores
EPSS
0.0160
EPSS Percentile
81.8%
Details
CWE
CWE-94
Status
published
Products (1)
mundi_king/mundi_mail
0.8.2
Published
Jun 17, 2009
Tracked Since
Feb 18, 2026