Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23829: CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection') in axllent mailpit

0
Medium
VulnerabilityCVE-2026-23829cvecve-2026-23829cwe-93cwe-150
Published: Sun Jan 18 2026 (01/18/2026, 23:23:04 UTC)
Source: CVE Database V5
Vendor/Project: axllent
Product: mailpit

Description

CVE-2026-23829 is a medium severity vulnerability in axllent's Mailpit email testing tool versions prior to 1. 28. 3. The SMTP server improperly validates email addresses in the RCPT TO and MAIL FROM commands, allowing an attacker to inject arbitrary SMTP headers via carriage return characters. This CRLF injection occurs due to a flawed regular expression that fails to exclude \r and \n characters, enabling header injection or corruption. Exploitation requires no authentication or user interaction and can be performed remotely over the network. While the vulnerability does not impact confidentiality or availability, it can affect the integrity of email headers, potentially leading to spoofing or manipulation in testing environments. No known exploits are currently reported in the wild. The issue is fixed in Mailpit version 1. 28.

AI-Powered Analysis

AILast updated: 01/18/2026, 23:56:05 UTC

Technical Analysis

CVE-2026-23829 is a CRLF injection vulnerability affecting the SMTP server component of axllent's Mailpit, an email testing tool and API widely used by developers. The root cause is an insufficient regular expression used to validate the 'RCPT TO' and 'MAIL FROM' email address fields. Specifically, the regex fails to exclude carriage return (\r) and line feed (\n) characters when used inside a character class, allowing these control characters to be injected into email addresses. An attacker can exploit this flaw by crafting SMTP commands with maliciously constructed email addresses containing \r characters, which the server then interprets as header delimiters. This enables injection of arbitrary SMTP headers or corruption of existing headers, potentially altering the behavior of the SMTP session or the content of emails processed by Mailpit. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network. The impact is limited to integrity issues in email headers, with no direct confidentiality or availability impact. The vulnerability is tracked under CWE-93 (Improper Neutralization of CRLF Sequences) and CWE-150 (Improper Neutralization of Input During Web Page Generation). The issue was addressed in Mailpit version 1.28.3 by correcting the regular expression to properly exclude CR and LF characters from email address validation. No known exploits have been reported in the wild as of the publication date. The CVSS v3.1 base score is 5.3, reflecting medium severity due to ease of exploitation and integrity impact without confidentiality or availability loss.

Potential Impact

For European organizations, the primary impact of CVE-2026-23829 lies in the potential manipulation of email headers within development and testing environments using vulnerable Mailpit versions. While Mailpit is primarily a testing tool and not typically used in production email infrastructure, compromised header integrity can lead to misleading test results, corrupted email flows, or spoofed headers that may mask malicious activity during development cycles. This can hinder secure software development lifecycle (SDLC) processes and potentially introduce risks if testing environments are connected to production or if test data leaks. Since the vulnerability does not affect confidentiality or availability, direct data breaches or service outages are unlikely. However, organizations relying on Mailpit for email validation or integration testing may face integrity risks that could cascade into broader security issues if not addressed. The lack of authentication and remote exploitability increases the risk surface, especially in environments where Mailpit is exposed to untrusted networks. European organizations with active development teams using Mailpit should prioritize patching to maintain secure testing practices and prevent potential abuse of email header injection.

Mitigation Recommendations

1. Upgrade Mailpit to version 1.28.3 or later immediately to apply the official fix that corrects the regular expression validation of email addresses. 2. Restrict network access to Mailpit SMTP servers to trusted development and testing environments only, using network segmentation and firewall rules to prevent exposure to untrusted external networks. 3. Implement monitoring and logging of SMTP commands and email headers processed by Mailpit to detect anomalous or suspicious injection attempts. 4. Educate development and QA teams about the risks of using outdated testing tools and enforce policies to keep testing software up to date. 5. If upgrading is temporarily not possible, consider applying input filtering or proxying SMTP traffic through a validation layer that strips or rejects CR and LF characters in email addresses. 6. Review integration points where Mailpit interacts with other systems to ensure that injected headers cannot propagate into production environments. 7. Conduct regular security assessments of development and testing tools to identify and remediate similar vulnerabilities proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-16T15:46:40.841Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696d6fb9d302b072d906e976

Added to database: 1/18/2026, 11:41:45 PM

Last enriched: 1/18/2026, 11:56:05 PM

Last updated: 1/19/2026, 3:52:45 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats