CVE-2016-10033

CRITICAL KEV NUCLEI

PHPMailer Sendmail Argument Injection

Title source: metasploit

Description

The mailSend function in the isMail transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted Sender property.

Exploits (32)

nomisec WORKING POC 405 stars
by opsxcq · remote
https://github.com/opsxcq/exploit-CVE-2016-10033
nomisec WORKING POC 9 stars
by GeneralTesler · remote
https://github.com/GeneralTesler/CVE-2016-10033
nomisec STUB 8 stars
by Zenexer · poc
https://github.com/Zenexer/safeshell
nomisec WORKING POC 6 stars
by 0x00-0x00 · remote
https://github.com/0x00-0x00/CVE-2016-10033
nomisec WORKING POC 2 stars
by pedro823 · poc
https://github.com/pedro823/cve-2016-10033-45
nomisec WORKING POC 1 stars
by liusec · poc
https://github.com/liusec/WP-CVE-2016-10033
nomisec WORKING POC 1 stars
by j4k0m · remote
https://github.com/j4k0m/CVE-2016-10033
github WORKING POC 1 stars
by vaishakhcv · perlpoc
https://github.com/vaishakhcv/CVE-exploits/tree/master/CVE-2016-10033
nomisec WORKING POC 1 stars
by chipironcin · poc
https://github.com/chipironcin/CVE-2016-10033
github WORKING POC 1 stars
by vadimgggg · pythonpoc
https://github.com/vadimgggg/CVE-PoC/tree/main/CVE-2016-10033
nomisec WORKING POC 1 stars
by awidardi · remote
https://github.com/awidardi/opsxcq-cve-2016-10033
nomisec WORKING POC
by cved-sources · poc
https://github.com/cved-sources/cve-2016-10033
nomisec WORKING POC
by zeeshanbhattined · remote
https://github.com/zeeshanbhattined/exploit-CVE-2016-10033
nomisec WORKING POC
by ElnurBDa · remote
https://github.com/ElnurBDa/CVE-2016-10033
nomisec WORKING POC
by sealldeveloper · remote
https://github.com/sealldeveloper/CVE-2016-10033-PoC
nomisec WORKING POC
by alexander47777 · remote
https://github.com/alexander47777/CVE-2016-10033
github WORKING POC
by winterwolf32 · perlpoc
https://github.com/winterwolf32/CVE_Exploits-/tree/master/CVE-2016-10033
nomisec WORKING POC
by Astrowmist · poc
https://github.com/Astrowmist/POC-CVE-2016-10033
nomisec WORKING POC
by Bajunan · poc
https://github.com/Bajunan/CVE-2016-10033
exploitdb WORKING POC VERIFIED
by Dawid Golunski · bashwebappsphp
https://www.exploit-db.com/exploits/40968
exploitdb WORKING POC
by phackt_ul · pythonwebappsphp
https://www.exploit-db.com/exploits/42221
metasploit WORKING POC NORMAL
by Dawid Golunski, wvu · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/wp_phpmailer_host_header.rb
exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotephp
https://www.exploit-db.com/exploits/42024
metasploit WORKING POC MANUAL
by Dawid Golunski, Spencer McIntyre · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/phpmailer_arg_injection.rb
exploitdb WORKING POC
by Dawid Golunski · pythonwebappsphp
https://www.exploit-db.com/exploits/40986
exploitdb WORKING POC
by Dawid Golunski · bashwebappslinux
https://www.exploit-db.com/exploits/41962
exploitdb WORKING POC
by Dawid Golunski · phpwebappsphp
https://www.exploit-db.com/exploits/40970
exploitdb WORKING POC
by anarc0der · pythonwebappsphp
https://www.exploit-db.com/exploits/40974
exploitdb WORKING POC
by Dawid Golunski · bashremotephp
https://www.exploit-db.com/exploits/41996
exploitdb WORKING POC
by Dawid Golunski · pythonwebappsphp
https://www.exploit-db.com/exploits/40969

Nuclei Templates (1)

WordPress PHPMailer < 5.2.18 - Remote Code Execution
CRITICALby princechaddha

References (22)

... and 2 more

Scores

CVSS v3 9.8
EPSS 0.9447
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2025-07-07
VulnCheck KEV 2022-01-26
InTheWild.io 2022-01-26
ENISA EUVD EUVD-2020-0331

Classification

CWE
CWE-88
Status draft

Affected Products (4)

phpmailer_project/phpmailer < 5.2.18
wordpress/wordpress < 4.7
joomla/joomla\! < 3.6.5
phpmailer/phpmailer < 5.2.18Packagist

Timeline

Published Dec 30, 2016
KEV Added Jul 07, 2025
Tracked Since Feb 18, 2026