-
CVSS Score
-The vulnerability stems from insufficient sanitization in the Sendmail transport's header preparation. The patch specifically adds validation in prepareHeaders() to check for " sequences in From addresses, and the vulnerability description explicitly mentions header manipulation leading to command injection. The function's role in constructing mail headers for system delivery makes it the clear injection point.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| zendframework/zendframework | composer | >= 2.0.0, < 2.4.11 | 2.4.11 |