GHSA-jj37-3377-m6vv

Suggest an improvement
Source
https://github.com/advisories/GHSA-jj37-3377-m6vv
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/11/GHSA-jj37-3377-m6vv/GHSA-jj37-3377-m6vv.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-jj37-3377-m6vv
Withdrawn
2025-11-17T17:17:33Z
Published
2025-11-14T21:30:29Z
Modified
2025-11-17T17:17:33Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
Duplicate Advisory: Nodemailer: Email to an unintended domain can occur due to Interpretation Conflict
Details

Duplicate Advisory

This advisory has been withdrawn because it is a duplicate of GHSA-mm7p-fcc7-pg87. This link is maintained to preserve external references.

Original Description

A vulnerability was identified in the email parsing library due to improper handling of specially formatted recipient email addresses. An attacker can exploit this flaw by crafting a recipient address that embeds an external address within quotes. This causes the application to misdirect the email to the attacker's external address instead of the intended internal recipient. This could lead to a significant data leak of sensitive information and allow an attacker to bypass security filters and access controls.

Database specific
{
    "cwe_ids": [
        "CWE-436"
    ],
    "github_reviewed_at": "2025-11-17T17:17:33Z",
    "nvd_published_at": "2025-11-14T20:15:45Z",
    "severity": "HIGH",
    "github_reviewed": true
}
References

Affected packages

npm / nodemailer

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.0.7

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/11/GHSA-jj37-3377-m6vv/GHSA-jj37-3377-m6vv.json"