Home

Description

A vulnerability was identified in the email parsing library due to improper handling of specially formatted recipient email addresses. An attacker can exploit this flaw by crafting a recipient address that embeds an external address within quotes. This causes the application to misdirect the email to the attacker's external address instead of the intended internal recipient. This could lead to a significant data leak of sensitive information and allow an attacker to bypass security filters and access controls.

PUBLISHED Reserved 2025-11-11 | Published 2025-11-14 | Updated 2025-11-14 | Assigner redhat




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

Interpretation Conflict

Product status

Default status
affected

Default status
affected

Default status
affected

Timeline

2025-10-07:Reported to Red Hat.
2025-10-07:Made public.

References

access.redhat.com/security/cve/CVE-2025-13033 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2402179 (RHBZ#2402179) issue-tracking

github.com/nodemailer/nodemailer

github.com/...ommit/1150d99fba77280df2cfb1885c43df23109a8626

github.com/...mailer/security/advisories/GHSA-mm7p-fcc7-pg87

cve.org (CVE-2025-13033)

nvd.nist.gov (CVE-2025-13033)

Download JSON