Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26312: CWE-770: Allocation of Resources Without Limits or Throttling in stalwartlabs stalwart

0
Medium
VulnerabilityCVE-2026-26312cvecve-2026-26312cwe-770
Published: Thu Feb 19 2026 (02/19/2026, 21:05:11 UTC)
Source: CVE Database V5
Vendor/Project: stalwartlabs
Product: stalwart

Description

CVE-2026-26312 is a denial-of-service vulnerability in Stalwart Mail Server versions 0. 13. 0 through 0. 15. 4. It arises from the server's handling of specially crafted emails containing malformed nested message/rfc822 MIME parts accessed via IMAP or JMAP protocols. The malformed structure causes the mail-parser crate to create cyclical references, leading the server to consume excessive CPU and memory resources indefinitely. This can result in an out-of-memory condition and server crash, disrupting mail services. The vulnerability requires low privileges but no user interaction and has a CVSS score of 6. 5 (medium severity).

AI-Powered Analysis

AILast updated: 02/19/2026, 21:32:04 UTC

Technical Analysis

CVE-2026-26312 is a resource exhaustion vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting the Stalwart Mail Server, a mail and collaboration platform. The flaw exists in versions 0.13.0 through 0.15.4 and is triggered when the server processes specially crafted emails containing malformed nested message/rfc822 MIME parts via IMAP or JMAP protocols. The malformed MIME structure causes the underlying mail-parser crate to generate cyclical references within its parsed data representation. Stalwart's processing logic follows these cyclical references indefinitely, leading to unbounded CPU and memory consumption. This resource exhaustion can cause the server to run out of memory and crash, resulting in a denial-of-service condition. The vulnerability does not affect confidentiality or integrity but severely impacts availability. Exploitation requires only low-level privileges (PR:L) and no user interaction (UI:N), making it relatively easy to exploit by authenticated users. The issue was addressed in Stalwart version 0.15.5, which includes a patch to detect and handle malformed MIME structures safely, preventing infinite resource consumption. No public exploits have been reported yet, but the vulnerability poses a significant risk to mail server availability if left unpatched.

Potential Impact

The primary impact of CVE-2026-26312 is denial of service due to resource exhaustion on affected Stalwart Mail Servers. Organizations relying on Stalwart for mail and collaboration services may experience server crashes and service outages when targeted with maliciously crafted emails exploiting this vulnerability. This can disrupt internal and external communications, potentially affecting business operations, customer support, and collaboration workflows. The vulnerability does not expose sensitive data or allow unauthorized access but can degrade service availability, leading to productivity losses and reputational damage. Since the attack vector requires authenticated access, insider threats or compromised accounts could be leveraged to trigger the exploit. Additionally, mail servers exposed to the internet may be targeted by external attackers who have obtained valid credentials. The medium CVSS score reflects moderate severity, but the ease of exploitation and potential for service disruption make timely remediation critical.

Mitigation Recommendations

To mitigate CVE-2026-26312, organizations should upgrade Stalwart Mail Server to version 0.15.5 or later, which contains the official patch addressing the malformed MIME parsing issue. Until the upgrade is applied, administrators should implement strict access controls to limit authenticated user access to trusted personnel only, reducing the risk of exploitation by unauthorized users. Monitoring mail server logs for unusual IMAP or JMAP requests containing nested message/rfc822 MIME parts can help detect attempted exploitation. Rate limiting or throttling IMAP and JMAP requests may reduce the impact of resource exhaustion attacks. Deploying network-level protections such as Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with custom rules to detect and block malformed MIME payloads can provide additional defense layers. Regularly auditing and rotating credentials reduces the risk of compromised accounts being used to exploit this vulnerability. Finally, maintaining robust backup and recovery procedures ensures rapid restoration of services in case of a successful denial-of-service attack.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-13T16:27:51.806Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69977dd1d7880ec89b33bbe3

Added to database: 2/19/2026, 9:17:05 PM

Last enriched: 2/19/2026, 9:32:04 PM

Last updated: 2/19/2026, 10:54:21 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats