icon

We found results for “

CVE-2026-23829

Good to know:

icon
icon

Date: January 18, 2026

Mailpit is an email testing tool and API for developers. Prior to version 1.28.3, Mailpit's SMTP server is vulnerable to Header Injection due to an insufficient Regular Expression used to validate "RCPT TO" and "MAIL FROM" addresses. An attacker can inject arbitrary SMTP headers (or corrupt existing ones) by including carriage return characters ("\r") in the email address. This header injection occurs because the regex intended to filter control characters fails to exclude "\r" and "\n" when used inside a character class. Version 1.28.3 fixes this issue.

Severity Score

Severity Score

Weakness Type (CWE)

Improper Neutralization of CRLF Sequences ('CRLF Injection')

CWE-93

Improper Neutralization of Escape, Meta, or Control Sequences

CWE-150

Top Fix

icon

Upgrade Version

Upgrade to version github.com/axllent/mailpit - v1.28.3;https://github.com/axllent/mailpit.git - v1.28.3

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): NONE
Integrity (I): LOW
Availability (A): NONE

Do you need more information?

Contact Us