Логотип exploitDog
bind:CVE-2025-59937
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-59937

Количество 2

Количество 2

nvd логотип

CVE-2025-59937

4 месяца назад

go-mail is a comprehensive library for sending mails with Go. In versions 0.7.0 and below, due to incorrect handling of the mail.Address values when a sender- or recipient address is passed to the corresponding MAIL FROM or RCPT TO commands of the SMTP client, there is a possibility of wrong address routing or even ESMTP parameter smuggling. For successful exploitation, it is required that the user's code allows for arbitrary mail address input (i. e. through a web form or similar). If only static mail addresses are used (i. e. in a config file) and the mail addresses in use do not consist of quoted local parts, this should not affect users. This issue is fixed in version 0.7.1

CVSS3: 9.1
EPSS: Низкий
github логотип

GHSA-wpwj-69cm-q9c5

4 месяца назад

go-mail has insufficient address encoding when passing mail addresses to the SMTP client

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-59937

go-mail is a comprehensive library for sending mails with Go. In versions 0.7.0 and below, due to incorrect handling of the mail.Address values when a sender- or recipient address is passed to the corresponding MAIL FROM or RCPT TO commands of the SMTP client, there is a possibility of wrong address routing or even ESMTP parameter smuggling. For successful exploitation, it is required that the user's code allows for arbitrary mail address input (i. e. through a web form or similar). If only static mail addresses are used (i. e. in a config file) and the mail addresses in use do not consist of quoted local parts, this should not affect users. This issue is fixed in version 0.7.1

CVSS3: 9.1
0%
Низкий
4 месяца назад
github логотип
GHSA-wpwj-69cm-q9c5

go-mail has insufficient address encoding when passing mail addresses to the SMTP client

0%
Низкий
4 месяца назад

Уязвимостей на страницу