Vulnerability Details CVE-2022-39265
MyBB is a free and open source forum software. The _Mail Settings_ → Additional Parameters for PHP's mail() function mail_parameters setting value, in connection with the configured mail program's options and behavior, may allow access to sensitive information and Remote Code Execution (RCE). The vulnerable module requires Admin CP access with the `_Can manage settings?_` permission and may depend on configured file permissions. MyBB 1.8.31 resolves this issue with the commit `0cd318136a`. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.018
EPSS Ranking 81.8%
CVSS Severity
CVSS v3 Score 7.2
Products affected by CVE-2022-39265
-
-
cpe:2.3:a:mybb:mybb:1.0.2
-
-
-
-
-
-
cpe:2.3:a:mybb:mybb:1.1.0
-
cpe:2.3:a:mybb:mybb:1.1.1
-
cpe:2.3:a:mybb:mybb:1.1.2
-
cpe:2.3:a:mybb:mybb:1.1.3
-
cpe:2.3:a:mybb:mybb:1.1.4
-
cpe:2.3:a:mybb:mybb:1.1.5
-
cpe:2.3:a:mybb:mybb:1.1.6
-
cpe:2.3:a:mybb:mybb:1.1.7
-
cpe:2.3:a:mybb:mybb:1.1.8
-
-
cpe:2.3:a:mybb:mybb:1.2.0
-
cpe:2.3:a:mybb:mybb:1.2.1
-
cpe:2.3:a:mybb:mybb:1.2.10
-
cpe:2.3:a:mybb:mybb:1.2.11
-
cpe:2.3:a:mybb:mybb:1.2.12
-
cpe:2.3:a:mybb:mybb:1.2.13
-
cpe:2.3:a:mybb:mybb:1.2.14
-
cpe:2.3:a:mybb:mybb:1.2.2
-
cpe:2.3:a:mybb:mybb:1.2.3
-
cpe:2.3:a:mybb:mybb:1.2.4
-
cpe:2.3:a:mybb:mybb:1.2.5
-
cpe:2.3:a:mybb:mybb:1.2.6
-
cpe:2.3:a:mybb:mybb:1.2.7
-
cpe:2.3:a:mybb:mybb:1.2.8
-
cpe:2.3:a:mybb:mybb:1.2.9
-
-
cpe:2.3:a:mybb:mybb:1.4.0
-
cpe:2.3:a:mybb:mybb:1.4.1
-
cpe:2.3:a:mybb:mybb:1.4.10
-
cpe:2.3:a:mybb:mybb:1.4.11
-
cpe:2.3:a:mybb:mybb:1.4.12
-
cpe:2.3:a:mybb:mybb:1.4.13
-
cpe:2.3:a:mybb:mybb:1.4.14
-
cpe:2.3:a:mybb:mybb:1.4.15
-
cpe:2.3:a:mybb:mybb:1.4.16
-
cpe:2.3:a:mybb:mybb:1.4.2
-
cpe:2.3:a:mybb:mybb:1.4.3
-
cpe:2.3:a:mybb:mybb:1.4.4
-
cpe:2.3:a:mybb:mybb:1.4.5
-
cpe:2.3:a:mybb:mybb:1.4.6
-
cpe:2.3:a:mybb:mybb:1.4.7
-
cpe:2.3:a:mybb:mybb:1.4.8
-
cpe:2.3:a:mybb:mybb:1.4.9
-
cpe:2.3:a:mybb:mybb:1.5.1
-
cpe:2.3:a:mybb:mybb:1.5.2
-
cpe:2.3:a:mybb:mybb:1.6.0
-
cpe:2.3:a:mybb:mybb:1.6.1
-
cpe:2.3:a:mybb:mybb:1.6.10
-
cpe:2.3:a:mybb:mybb:1.6.11
-
cpe:2.3:a:mybb:mybb:1.6.12
-
cpe:2.3:a:mybb:mybb:1.6.13
-
cpe:2.3:a:mybb:mybb:1.6.14
-
cpe:2.3:a:mybb:mybb:1.6.15
-
cpe:2.3:a:mybb:mybb:1.6.16
-
cpe:2.3:a:mybb:mybb:1.6.17
-
cpe:2.3:a:mybb:mybb:1.6.18
-
cpe:2.3:a:mybb:mybb:1.6.2
-
cpe:2.3:a:mybb:mybb:1.6.3
-
cpe:2.3:a:mybb:mybb:1.6.4
-
cpe:2.3:a:mybb:mybb:1.6.5
-
cpe:2.3:a:mybb:mybb:1.6.6
-
cpe:2.3:a:mybb:mybb:1.6.7
-
cpe:2.3:a:mybb:mybb:1.6.8
-
cpe:2.3:a:mybb:mybb:1.6.9
-
cpe:2.3:a:mybb:mybb:1.8.0
-
cpe:2.3:a:mybb:mybb:1.8.1
-
cpe:2.3:a:mybb:mybb:1.8.10
-
cpe:2.3:a:mybb:mybb:1.8.11
-
cpe:2.3:a:mybb:mybb:1.8.12
-
cpe:2.3:a:mybb:mybb:1.8.13
-
cpe:2.3:a:mybb:mybb:1.8.14
-
cpe:2.3:a:mybb:mybb:1.8.15
-
cpe:2.3:a:mybb:mybb:1.8.16
-
cpe:2.3:a:mybb:mybb:1.8.17
-
cpe:2.3:a:mybb:mybb:1.8.18
-
cpe:2.3:a:mybb:mybb:1.8.19
-
cpe:2.3:a:mybb:mybb:1.8.2
-
cpe:2.3:a:mybb:mybb:1.8.20
-
cpe:2.3:a:mybb:mybb:1.8.21
-
cpe:2.3:a:mybb:mybb:1.8.22
-
cpe:2.3:a:mybb:mybb:1.8.23
-
cpe:2.3:a:mybb:mybb:1.8.24
-
cpe:2.3:a:mybb:mybb:1.8.25
-
cpe:2.3:a:mybb:mybb:1.8.26
-
cpe:2.3:a:mybb:mybb:1.8.27
-
cpe:2.3:a:mybb:mybb:1.8.28
-
cpe:2.3:a:mybb:mybb:1.8.29
-
cpe:2.3:a:mybb:mybb:1.8.3
-
cpe:2.3:a:mybb:mybb:1.8.30
-
cpe:2.3:a:mybb:mybb:1.8.4
-
cpe:2.3:a:mybb:mybb:1.8.5
-
cpe:2.3:a:mybb:mybb:1.8.6
-
cpe:2.3:a:mybb:mybb:1.8.7
-
cpe:2.3:a:mybb:mybb:1.8.8
-
cpe:2.3:a:mybb:mybb:1.8.9