{"api_version":"1","generated_at":"2026-05-09T11:00:21+00:00","cve":"CVE-2022-39265","urls":{"html":"https://cve.report/CVE-2022-39265","api":"https://cve.report/api/cve/CVE-2022-39265.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-39265","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-39265"},"summary":{"title":"CVE-2022-39265","description":"MyBB is a free and open source forum software. The _Mail Settings_ → Additional Parameters for PHP's mail() function mail_parameters setting value, in connection with the configured mail program's options and behavior, may allow access to sensitive information and Remote Code Execution (RCE). The vulnerable module requires Admin CP access with the `_Can manage settings?_` permission and may depend on configured file permissions. MyBB 1.8.31 resolves this issue with the commit `0cd318136a`. Users are advised to upgrade. There are no known workarounds for this vulnerability.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2022-10-06 18:16:00","updated_at":"2023-11-07 03:50:00"},"problem_types":["CWE-74"],"metrics":[],"references":[{"url":"https://github.com/mybb/mybb/security/advisories/GHSA-hxhm-rq9f-7xj7","name":"https://github.com/mybb/mybb/security/advisories/GHSA-hxhm-rq9f-7xj7","refsource":"CONFIRM","tags":[],"title":"Mail settings' command parameter injection · Advisory · mybb/mybb · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/mybb/mybb/blob/mybb_1830/install/resources/settings.xml#L2331-L2338","name":"https://github.com/mybb/mybb/blob/mybb_1830/install/resources/settings.xml#L2331-L2338","refsource":"MISC","tags":[],"title":"mybb/settings.xml at mybb_1830 · mybb/mybb · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://mybb.com/versions/1.8.31/","name":"https://mybb.com/versions/1.8.31/","refsource":"MISC","tags":[],"title":"Version 1.8.31 - MyBB","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/mybb/mybb/commit/0cd318136a10b029bb5c8a8f6dddf39d87519797","name":"https://github.com/mybb/mybb/commit/0cd318136a10b029bb5c8a8f6dddf39d87519797","refsource":"MISC","tags":[],"title":"Fix Mail settings command parameter injection · mybb/mybb@0cd3181 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-39265","name":"https://www.cve.org/CVERecord?id=CVE-2022-39265","refsource":"MISC","tags":[],"title":"cve-website","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-39265","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"39265","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mybb","cpe5":"mybb","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2022-39265","STATE":"PUBLIC","TITLE":"Mail settings' command parameter injection in mybb"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"mybb","version":{"version_data":[{"version_value":"< 1.8.31"}]}}]},"vendor_name":"mybb"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"MyBB is a free and open source forum software. The _Mail Settings_ → Additional Parameters for PHP's mail() function mail_parameters setting value, in connection with the configured mail program's options and behavior, may allow access to sensitive information and Remote Code Execution (RCE). The vulnerable module requires Admin CP access with the `_Can manage settings?_` permission and may depend on configured file permissions. MyBB 1.8.31 resolves this issue with the commit `0cd318136a`. Users are advised to upgrade. There are no known workarounds for this vulnerability."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')"}]}]},"references":{"reference_data":[{"name":"https://github.com/mybb/mybb/security/advisories/GHSA-hxhm-rq9f-7xj7","refsource":"CONFIRM","url":"https://github.com/mybb/mybb/security/advisories/GHSA-hxhm-rq9f-7xj7"},{"name":"https://github.com/mybb/mybb/commit/0cd318136a10b029bb5c8a8f6dddf39d87519797","refsource":"MISC","url":"https://github.com/mybb/mybb/commit/0cd318136a10b029bb5c8a8f6dddf39d87519797"},{"name":"https://github.com/mybb/mybb/blob/mybb_1830/install/resources/settings.xml#L2331-L2338","refsource":"MISC","url":"https://github.com/mybb/mybb/blob/mybb_1830/install/resources/settings.xml#L2331-L2338"},{"name":"https://mybb.com/versions/1.8.31/","refsource":"MISC","url":"https://mybb.com/versions/1.8.31/"}]},"source":{"advisory":"GHSA-hxhm-rq9f-7xj7","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2022-10-06 18:16:00","lastModifiedDate":"2023-11-07 03:50:00","problem_types":["CWE-74"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mybb:mybb:*:*:*:*:*:*:*:*","versionEndExcluding":"1.8.31","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}