CVE-2026-27492: CWE-488: Exposure of Data Element to Wrong Session in lettermint lettermint-node
Lettermint Node.js SDK is the official Node.js SDK for Lettermint. In versions 1.5.0 and below, email properties (such as to, subject, html, text, and attachments) are not reset between sends when a single client instance is reused across multiple .send() calls. This can cause properties from a previous send to leak into a subsequent one, potentially delivering content or recipient addresses to unintended parties. Applications sending emails to different recipients in sequence — such as transactional flows like password resets or notifications — are affected. This issue has been fixed in version 1.5.1.
AI Analysis
Technical Summary
CVE-2026-27492 is a vulnerability classified under CWE-488 (Exposure of Data Element to Wrong Session) affecting the Lettermint Node.js SDK (lettermint-node) versions 1.5.0 and earlier. The issue arises because the SDK does not reset email-related properties such as 'to', 'subject', 'html', 'text', and 'attachments' between consecutive .send() calls when the same client instance is reused. This improper state management leads to residual data from a previous email send operation persisting into subsequent sends. Consequently, sensitive email content or recipient information can be inadvertently disclosed to unintended recipients. This is particularly critical in applications that send multiple emails in sequence, such as transactional email flows involving password resets, notifications, or other user-specific communications. The vulnerability requires an attacker to have local or internal network access with low privileges and does not require user interaction, but the attack complexity is high due to the need to reuse the same client instance improperly. The CVSS v3.1 base score is 4.7, reflecting medium severity, with a vector indicating local attack vector, high attack complexity, low privileges required, no user interaction, unchanged scope, high confidentiality impact, no integrity or availability impact. No known exploits are currently reported in the wild. The issue was addressed in version 1.5.1 of the SDK by ensuring proper resetting of email properties between sends, preventing data leakage across sessions.
Potential Impact
The primary impact of this vulnerability is the unintended disclosure of sensitive email content and recipient information, which compromises confidentiality. Organizations using affected versions of the Lettermint Node.js SDK in applications that send multiple emails sequentially risk leaking private data such as user email addresses, personal information, or confidential attachments to wrong recipients. This can lead to privacy violations, regulatory non-compliance (e.g., GDPR, HIPAA), reputational damage, and potential legal consequences. Although the vulnerability does not affect data integrity or system availability, the exposure of sensitive information can facilitate social engineering attacks, phishing, or identity theft. The attack requires local or internal network access and some knowledge of the application’s email sending logic, which limits the scope but does not eliminate risk, especially in multi-tenant or shared environments. Organizations relying on transactional email flows or bulk email sending with reused client instances are particularly vulnerable.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade the Lettermint Node.js SDK to version 1.5.1 or later, where the issue is fixed. Developers should audit their email sending code to ensure that each email send operation uses a fresh client instance or explicitly resets all email properties before reuse. Implementing strict input validation and output sanitization for email content can reduce the risk of unintended data leakage. Additionally, segregate email sending contexts per user or transaction to avoid cross-contamination of data. Monitoring and logging email send operations can help detect anomalous behavior indicative of data leaks. Where possible, restrict access to the email sending functionality to trusted internal systems and users to limit the attack surface. Conduct regular code reviews and security testing focusing on session and state management in email-related components. Finally, educate developers about secure SDK usage patterns to prevent similar issues.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Japan, South Korea, India
CVE-2026-27492: CWE-488: Exposure of Data Element to Wrong Session in lettermint lettermint-node
Description
Lettermint Node.js SDK is the official Node.js SDK for Lettermint. In versions 1.5.0 and below, email properties (such as to, subject, html, text, and attachments) are not reset between sends when a single client instance is reused across multiple .send() calls. This can cause properties from a previous send to leak into a subsequent one, potentially delivering content or recipient addresses to unintended parties. Applications sending emails to different recipients in sequence — such as transactional flows like password resets or notifications — are affected. This issue has been fixed in version 1.5.1.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-27492 is a vulnerability classified under CWE-488 (Exposure of Data Element to Wrong Session) affecting the Lettermint Node.js SDK (lettermint-node) versions 1.5.0 and earlier. The issue arises because the SDK does not reset email-related properties such as 'to', 'subject', 'html', 'text', and 'attachments' between consecutive .send() calls when the same client instance is reused. This improper state management leads to residual data from a previous email send operation persisting into subsequent sends. Consequently, sensitive email content or recipient information can be inadvertently disclosed to unintended recipients. This is particularly critical in applications that send multiple emails in sequence, such as transactional email flows involving password resets, notifications, or other user-specific communications. The vulnerability requires an attacker to have local or internal network access with low privileges and does not require user interaction, but the attack complexity is high due to the need to reuse the same client instance improperly. The CVSS v3.1 base score is 4.7, reflecting medium severity, with a vector indicating local attack vector, high attack complexity, low privileges required, no user interaction, unchanged scope, high confidentiality impact, no integrity or availability impact. No known exploits are currently reported in the wild. The issue was addressed in version 1.5.1 of the SDK by ensuring proper resetting of email properties between sends, preventing data leakage across sessions.
Potential Impact
The primary impact of this vulnerability is the unintended disclosure of sensitive email content and recipient information, which compromises confidentiality. Organizations using affected versions of the Lettermint Node.js SDK in applications that send multiple emails sequentially risk leaking private data such as user email addresses, personal information, or confidential attachments to wrong recipients. This can lead to privacy violations, regulatory non-compliance (e.g., GDPR, HIPAA), reputational damage, and potential legal consequences. Although the vulnerability does not affect data integrity or system availability, the exposure of sensitive information can facilitate social engineering attacks, phishing, or identity theft. The attack requires local or internal network access and some knowledge of the application’s email sending logic, which limits the scope but does not eliminate risk, especially in multi-tenant or shared environments. Organizations relying on transactional email flows or bulk email sending with reused client instances are particularly vulnerable.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade the Lettermint Node.js SDK to version 1.5.1 or later, where the issue is fixed. Developers should audit their email sending code to ensure that each email send operation uses a fresh client instance or explicitly resets all email properties before reuse. Implementing strict input validation and output sanitization for email content can reduce the risk of unintended data leakage. Additionally, segregate email sending contexts per user or transaction to avoid cross-contamination of data. Monitoring and logging email send operations can help detect anomalous behavior indicative of data leaks. Where possible, restrict access to the email sending functionality to trusted internal systems and users to limit the attack surface. Conduct regular code reviews and security testing focusing on session and state management in email-related components. Finally, educate developers about secure SDK usage patterns to prevent similar issues.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-19T19:46:03.541Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699989acbe58cf853b7b3299
Added to database: 2/21/2026, 10:32:12 AM
Last enriched: 2/28/2026, 12:42:54 PM
Last updated: 4/7/2026, 3:01:46 PM
Views: 148
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.