FoF Pretty Mail 1.1.2 contains a local file inclusion vulnerability that allows administrative users to include arbitrary server files in email templates. Attackers can exploit the template settings by inserting file inclusion payloads to read sensitive system files like /etc/passwd during email generation.
History

Fri, 12 Dec 2025 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Flarum
Flarum pretty Mail
Vendors & Products Flarum
Flarum pretty Mail

Thu, 11 Dec 2025 21:45:00 +0000

Type Values Removed Values Added
Description FoF Pretty Mail 1.1.2 contains a local file inclusion vulnerability that allows administrative users to include arbitrary server files in email templates. Attackers can exploit the template settings by inserting file inclusion payloads to read sensitive system files like /etc/passwd during email generation.
Title FoF Pretty Mail 1.1.2 Local File Inclusion via Email Template Settings
Weaknesses CWE-98
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-12-11T21:40:09.699Z

Updated: 2025-12-11T21:40:09.699Z

Reserved: 2025-12-11T00:58:28.457Z

Link: CVE-2024-58302

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-11T22:15:51.550

Modified: 2025-12-12T15:17:31.973

Link: CVE-2024-58302

cve-icon Redhat

No data.