Description
FoF Pretty Mail 1.1.2 contains a local file inclusion vulnerability that allows administrative users to include arbitrary server files in email templates. Attackers can exploit the template settings by inserting file inclusion payloads to read sensitive system files like /etc/passwd during email generation.
Problem types
Product status
1.1.2
Credits
Chokri Hammedii
References
www.exploit-db.com/exploits/51947 (ExploitDB-51947)
flarum.org/ (Flarum Homepage)
github.com/FriendsOfFlarum/pretty-mail (Pretty Mail GitHub Repository)
www.vulncheck.com/...e-inclusion-via-email-template-settings (VulnCheck Advisory: FoF Pretty Mail 1.1.2 Local File Inclusion via Email Template Settings)
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.