CVE-2026-27808: CWE-918: Server-Side Request Forgery (SSRF) in axllent mailpit
CVE-2026-27808 is a Server-Side Request Forgery (SSRF) vulnerability affecting axllent's Mailpit email testing tool versions prior to 1. 29. 2. The vulnerability exists in the Link Check API endpoint, which performs HTTP HEAD requests to URLs found in emails without validating or filtering target hosts, including private and internal IP addresses. This allows an unauthenticated remote attacker to induce the server to make arbitrary HTTP requests, potentially accessing internal resources or services. The vulnerability is non-blind, as the server returns HTTP status codes and status text for each link, providing immediate feedback to the attacker. Exploitation requires no user interaction and is fully remote in default configurations where no SMTP or API authentication is enabled. The issue was fixed in version 1. 29. 2.
AI Analysis
Technical Summary
CVE-2026-27808 is a Server-Side Request Forgery (SSRF) vulnerability in the Link Check API of axllent's Mailpit, an email testing tool and API used by developers. The vulnerable endpoint (/api/v1/message/{ID}/link-check) processes HTTP HEAD requests to every URL extracted from an email message without validating the destination hosts or filtering out private, internal, or loopback IP addresses. This lack of validation allows an attacker to craft emails containing malicious URLs that cause the Mailpit server to initiate HTTP requests to arbitrary internal or external systems. Because the server returns HTTP status codes and status text for each link, the attacker gains immediate feedback, making this a non-blind SSRF. The default Mailpit configuration does not require authentication for SMTP or API access, enabling remote, unauthenticated exploitation without user interaction. This vulnerability is related to previous SSRF issues fixed in other Mailpit API endpoints but was overlooked in the Link Check API. The flaw could be leveraged to access internal network resources, potentially bypassing firewall restrictions and exposing sensitive internal services. The vulnerability was assigned CVE-2026-27808 and fixed in Mailpit version 1.29.2. The CVSS 3.1 score of 5.8 reflects a medium severity, with network attack vector, low attack complexity, no privileges required, no user interaction, and a confidentiality impact limited to information disclosure without integrity or availability effects.
Potential Impact
The primary impact of this SSRF vulnerability is unauthorized information disclosure and potential internal network reconnaissance. An attacker can exploit the vulnerability to make the Mailpit server send HTTP requests to internal or protected network resources that are otherwise inaccessible externally. This can lead to the exposure of sensitive internal services, metadata endpoints, or administrative interfaces. While the vulnerability does not directly allow code execution or data modification, it can be a stepping stone for further attacks such as pivoting into internal networks, accessing cloud metadata services, or exploiting other internal vulnerabilities. Organizations using Mailpit in development, testing, or staging environments without proper network segmentation or authentication controls are at higher risk. Since the default configuration lacks authentication, many deployments may be exposed to remote exploitation. The vulnerability could disrupt trust in email testing processes and expose internal infrastructure details, potentially aiding attackers in crafting more targeted attacks. However, no known exploits in the wild have been reported to date.
Mitigation Recommendations
To mitigate CVE-2026-27808, organizations should immediately upgrade Mailpit to version 1.29.2 or later, where the vulnerability is fixed. Additionally, implement strict network segmentation to isolate Mailpit servers from sensitive internal networks, minimizing the impact of SSRF attempts. Configure authentication for SMTP and API access to prevent unauthorized remote exploitation. Employ input validation and URL filtering to restrict requests to trusted domains and disallow private or internal IP ranges. Use web application firewalls (WAFs) with SSRF detection rules to monitor and block suspicious outbound requests. Monitor logs for unusual outbound HTTP HEAD requests initiated by Mailpit. If upgrading is temporarily not possible, disable or restrict access to the Link Check API endpoint. Regularly audit and review Mailpit configurations and network access controls to ensure minimal exposure. Educate development and security teams about SSRF risks and secure coding practices to prevent similar issues in custom tools.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Netherlands, Japan, South Korea, India
CVE-2026-27808: CWE-918: Server-Side Request Forgery (SSRF) in axllent mailpit
Description
CVE-2026-27808 is a Server-Side Request Forgery (SSRF) vulnerability affecting axllent's Mailpit email testing tool versions prior to 1. 29. 2. The vulnerability exists in the Link Check API endpoint, which performs HTTP HEAD requests to URLs found in emails without validating or filtering target hosts, including private and internal IP addresses. This allows an unauthenticated remote attacker to induce the server to make arbitrary HTTP requests, potentially accessing internal resources or services. The vulnerability is non-blind, as the server returns HTTP status codes and status text for each link, providing immediate feedback to the attacker. Exploitation requires no user interaction and is fully remote in default configurations where no SMTP or API authentication is enabled. The issue was fixed in version 1. 29. 2.
AI-Powered Analysis
Technical Analysis
CVE-2026-27808 is a Server-Side Request Forgery (SSRF) vulnerability in the Link Check API of axllent's Mailpit, an email testing tool and API used by developers. The vulnerable endpoint (/api/v1/message/{ID}/link-check) processes HTTP HEAD requests to every URL extracted from an email message without validating the destination hosts or filtering out private, internal, or loopback IP addresses. This lack of validation allows an attacker to craft emails containing malicious URLs that cause the Mailpit server to initiate HTTP requests to arbitrary internal or external systems. Because the server returns HTTP status codes and status text for each link, the attacker gains immediate feedback, making this a non-blind SSRF. The default Mailpit configuration does not require authentication for SMTP or API access, enabling remote, unauthenticated exploitation without user interaction. This vulnerability is related to previous SSRF issues fixed in other Mailpit API endpoints but was overlooked in the Link Check API. The flaw could be leveraged to access internal network resources, potentially bypassing firewall restrictions and exposing sensitive internal services. The vulnerability was assigned CVE-2026-27808 and fixed in Mailpit version 1.29.2. The CVSS 3.1 score of 5.8 reflects a medium severity, with network attack vector, low attack complexity, no privileges required, no user interaction, and a confidentiality impact limited to information disclosure without integrity or availability effects.
Potential Impact
The primary impact of this SSRF vulnerability is unauthorized information disclosure and potential internal network reconnaissance. An attacker can exploit the vulnerability to make the Mailpit server send HTTP requests to internal or protected network resources that are otherwise inaccessible externally. This can lead to the exposure of sensitive internal services, metadata endpoints, or administrative interfaces. While the vulnerability does not directly allow code execution or data modification, it can be a stepping stone for further attacks such as pivoting into internal networks, accessing cloud metadata services, or exploiting other internal vulnerabilities. Organizations using Mailpit in development, testing, or staging environments without proper network segmentation or authentication controls are at higher risk. Since the default configuration lacks authentication, many deployments may be exposed to remote exploitation. The vulnerability could disrupt trust in email testing processes and expose internal infrastructure details, potentially aiding attackers in crafting more targeted attacks. However, no known exploits in the wild have been reported to date.
Mitigation Recommendations
To mitigate CVE-2026-27808, organizations should immediately upgrade Mailpit to version 1.29.2 or later, where the vulnerability is fixed. Additionally, implement strict network segmentation to isolate Mailpit servers from sensitive internal networks, minimizing the impact of SSRF attempts. Configure authentication for SMTP and API access to prevent unauthorized remote exploitation. Employ input validation and URL filtering to restrict requests to trusted domains and disallow private or internal IP ranges. Use web application firewalls (WAFs) with SSRF detection rules to monitor and block suspicious outbound requests. Monitor logs for unusual outbound HTTP HEAD requests initiated by Mailpit. If upgrading is temporarily not possible, disable or restrict access to the Link Check API endpoint. Regularly audit and review Mailpit configurations and network access controls to ensure minimal exposure. Educate development and security teams about SSRF risks and secure coding practices to prevent similar issues in custom tools.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-24T02:31:33.267Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f8fb4b7ef31ef0b6dc8d3
Added to database: 2/26/2026, 12:11:32 AM
Last enriched: 2/26/2026, 12:27:28 AM
Last updated: 2/26/2026, 2:27:48 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Finding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumCVE-2026-2498: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bulktheme WP Social Meta
MediumCVE-2026-2489: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in readymadeweb TP2WP Importer
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.