There are upcoming maintenance events which may impact our services. Learn more

PHPMailer Security Advisory (PCI Compliance & Standard Accounts Effected)

PHPMailer Security Advisory (PCI Compliance & Standard Accounts Effected)

  • Tuesday, 27th December, 2016
  • 14:49pm
Exploit type: Remote Code Execution in third-party PHPMailer library
CVE Numbers: CVE-2016-10033 and CVE-2016-10045

All versions of the third-party PHPMailer library distributed are vulnerable to a remote code execution vulnerability.

We have listed a few applications effected. Immediate upgrade is required to avoid interruptions to the PHP mailer system built within your application. To protect our servers and networks this requirement is not exceptional and must be repaired to avoid such actions and interruptions.

Software Known To the Advisory and thousands of others:

1. WordPress
2. Zen-Cart - 15.4 Versions & below. 1.5.5 claims to fix this issue.
2. OpenCart
3. CubeCart

All the listed above are known as well as many others. This critical PHPMailer flaw is to be taken seriously and leaves millions of websites vulnerable. Please update all applications that use this open-source software. Updating to the latest version should take care of the issue and will avoid interruptions of email services.

If you have any questions regarding this announcement or regarding how to get your website updated please contact our development & security team by opening a support request at


Powered by WHMCompleteSolution