FoF Pretty Mail 1.1.2 contains a local file inclusion vulnerability that allows administrative users to include arbitrary server files in email templates. Attackers can exploit the template settings by inserting file inclusion payloads to read sensitive system files like /etc/passwd during email generation.
Metrics
Affected Vendors & Products
References
History
Fri, 12 Dec 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Flarum
Flarum pretty Mail |
|
| Vendors & Products |
Flarum
Flarum pretty Mail |
Thu, 11 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | FoF Pretty Mail 1.1.2 contains a local file inclusion vulnerability that allows administrative users to include arbitrary server files in email templates. Attackers can exploit the template settings by inserting file inclusion payloads to read sensitive system files like /etc/passwd during email generation. | |
| Title | FoF Pretty Mail 1.1.2 Local File Inclusion via Email Template Settings | |
| Weaknesses | CWE-98 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-12-11T21:40:09.699Z
Updated: 2025-12-11T21:40:09.699Z
Reserved: 2025-12-11T00:58:28.457Z
Link: CVE-2024-58302
No data.
Status : Awaiting Analysis
Published: 2025-12-11T22:15:51.550
Modified: 2025-12-12T15:17:31.973
Link: CVE-2024-58302
No data.
ReportizFlow