Home

Description

go-mail is a comprehensive library for sending mails with Go. In versions 0.7.0 and below, due to incorrect handling of the mail.Address values when a sender- or recipient address is passed to the corresponding MAIL FROM or RCPT TO commands of the SMTP client, there is a possibility of wrong address routing or even ESMTP parameter smuggling. For successful exploitation, it is required that the user's code allows for arbitrary mail address input (i. e. through a web form or similar). If only static mail addresses are used (i. e. in a config file) and the mail addresses in use do not consist of quoted local parts, this should not affect users. This issue is fixed in version 0.7.1

PUBLISHED Reserved 2025-09-23 | Published 2025-09-29 | Updated 2025-09-30 | Assigner GitHub_M




HIGH: 8.2CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')

Product status

< 0.7.1
affected

References

github.com/...o-mail/security/advisories/GHSA-wpwj-69cm-q9c5

github.com/wneessen/go-mail/issues/495

github.com/wneessen/go-mail/pull/496

github.com/...ommit/42e92cfe027be04aff72921adb0f72f11d517479

cve.org (CVE-2025-59937)

nvd.nist.gov (CVE-2025-59937)

Download JSON