Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61600: CWE-400: Uncontrolled Resource Consumption in stalwartlabs stalwart

0
High
VulnerabilityCVE-2025-61600cvecve-2025-61600cwe-400cwe-789
Published: Thu Oct 02 2025 (10/02/2025, 21:30:52 UTC)
Source: CVE Database V5
Vendor/Project: stalwartlabs
Product: stalwart

Description

Stalwart is a mail and collaboration server. Versions 0.13.3 and below contain an unbounded memory allocation vulnerability in the IMAP protocol parser which allows remote attackers to exhaust server memory, potentially triggering the system's out-of-memory (OOM) killer and causing a denial of service. The CommandParser implementation enforces size limits on its dynamic buffer in most parsing states, but several state handlers omit these validation checks. This issue is fixed in version 0.13.4. A workaround for this issue is to implement rate limiting and connection monitoring at the network level, however this does not provide complete protection.

AI-Powered Analysis

AILast updated: 10/10/2025, 06:34:21 UTC

Technical Analysis

CVE-2025-61600 is a vulnerability categorized under CWE-400 (Uncontrolled Resource Consumption) and CWE-789 (Uncontrolled Memory Allocation) affecting stalwartlabs' stalwart mail and collaboration server software versions prior to 0.13.4. The flaw exists in the IMAP protocol parser, specifically within the CommandParser component. While most parsing states enforce size limits on dynamic buffers, several state handlers omit these checks, allowing an attacker to send specially crafted IMAP requests that cause the server to allocate memory without bounds. This unbounded memory allocation can exhaust the server's available memory resources, leading to the invocation of the operating system's out-of-memory (OOM) killer, which terminates processes to free memory. The result is a denial of service (DoS) condition, rendering the mail server unavailable to legitimate users. The vulnerability can be exploited remotely without authentication or user interaction, increasing its risk profile. Although no known exploits are reported in the wild as of the publication date, the vulnerability's nature and ease of exploitation make it a significant threat. The vendor addressed the issue in version 0.13.4 by adding proper size validation in all parsing states. As a temporary mitigation, network-level rate limiting and connection monitoring can reduce the attack surface but do not fully eliminate the risk. Organizations relying on stalwart for mail and collaboration services should prioritize upgrading to the patched version to prevent potential service outages caused by memory exhaustion attacks.

Potential Impact

For European organizations, the impact of CVE-2025-61600 can be substantial, particularly for those that use stalwart as a core mail and collaboration platform. A successful exploitation results in denial of service, disrupting email communication and collaboration workflows, which are critical for business operations. This can lead to operational downtime, loss of productivity, and potential reputational damage. Organizations in sectors such as finance, government, healthcare, and critical infrastructure, where reliable communication is essential, may face heightened risks. Additionally, denial of service attacks can be leveraged as part of multi-vector campaigns or to distract security teams while other attacks are carried out. The lack of authentication and user interaction requirements means attackers can launch attacks remotely and anonymously, increasing the likelihood of exploitation. The vulnerability also poses risks to service providers hosting stalwart servers for multiple clients, potentially affecting a broad user base. Given the high CVSS score (7.5) and the nature of the vulnerability, European entities should consider this a high-priority security issue.

Mitigation Recommendations

1. Immediate upgrade to stalwart version 0.13.4 or later, where the vulnerability is fixed, is the most effective mitigation. 2. Implement network-level rate limiting to restrict the number of IMAP connections and requests per client IP to reduce the risk of memory exhaustion attacks. 3. Deploy connection monitoring and anomaly detection systems to identify unusual spikes in IMAP traffic or malformed requests indicative of exploitation attempts. 4. Use firewall rules or intrusion prevention systems (IPS) to block or throttle suspicious traffic patterns targeting the IMAP service. 5. Isolate mail servers in segmented network zones with strict access controls to limit exposure. 6. Regularly audit and monitor server resource usage to detect early signs of memory exhaustion. 7. Maintain up-to-date backups and incident response plans to quickly recover from potential denial of service incidents. 8. Engage with stalwartlabs support channels for any additional patches or advisories. These steps go beyond generic advice by focusing on specific controls tailored to the IMAP protocol and the nature of the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-26T16:25:25.151Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68def0bad9a6bc6009193265

Added to database: 10/2/2025, 9:38:02 PM

Last enriched: 10/10/2025, 6:34:21 AM

Last updated: 11/16/2025, 7:23:52 AM

Views: 112

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats