Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27808: CWE-918: Server-Side Request Forgery (SSRF) in axllent mailpit

0
Medium
VulnerabilityCVE-2026-27808cvecve-2026-27808cwe-918
Published: Wed Feb 25 2026 (02/25/2026, 23:51:20 UTC)
Source: CVE Database V5
Vendor/Project: axllent
Product: mailpit

Description

CVE-2026-27808 is a Server-Side Request Forgery (SSRF) vulnerability affecting axllent's Mailpit email testing tool versions prior to 1. 29. 2. The vulnerability exists in the Link Check API endpoint, which performs HTTP HEAD requests to URLs found in emails without validating or filtering target hosts, including private and internal IP addresses. This allows an unauthenticated remote attacker to induce the server to make arbitrary HTTP requests, potentially accessing internal resources or services. The vulnerability is non-blind, as the server returns HTTP status codes and status text for each link, providing immediate feedback to the attacker. Exploitation requires no user interaction and is fully remote in default configurations where no SMTP or API authentication is enabled. The issue was fixed in version 1. 29. 2.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:27:28 UTC

Technical Analysis

CVE-2026-27808 is a Server-Side Request Forgery (SSRF) vulnerability in the Link Check API of axllent's Mailpit, an email testing tool and API used by developers. The vulnerable endpoint (/api/v1/message/{ID}/link-check) processes HTTP HEAD requests to every URL extracted from an email message without validating the destination hosts or filtering out private, internal, or loopback IP addresses. This lack of validation allows an attacker to craft emails containing malicious URLs that cause the Mailpit server to initiate HTTP requests to arbitrary internal or external systems. Because the server returns HTTP status codes and status text for each link, the attacker gains immediate feedback, making this a non-blind SSRF. The default Mailpit configuration does not require authentication for SMTP or API access, enabling remote, unauthenticated exploitation without user interaction. This vulnerability is related to previous SSRF issues fixed in other Mailpit API endpoints but was overlooked in the Link Check API. The flaw could be leveraged to access internal network resources, potentially bypassing firewall restrictions and exposing sensitive internal services. The vulnerability was assigned CVE-2026-27808 and fixed in Mailpit version 1.29.2. The CVSS 3.1 score of 5.8 reflects a medium severity, with network attack vector, low attack complexity, no privileges required, no user interaction, and a confidentiality impact limited to information disclosure without integrity or availability effects.

Potential Impact

The primary impact of this SSRF vulnerability is unauthorized information disclosure and potential internal network reconnaissance. An attacker can exploit the vulnerability to make the Mailpit server send HTTP requests to internal or protected network resources that are otherwise inaccessible externally. This can lead to the exposure of sensitive internal services, metadata endpoints, or administrative interfaces. While the vulnerability does not directly allow code execution or data modification, it can be a stepping stone for further attacks such as pivoting into internal networks, accessing cloud metadata services, or exploiting other internal vulnerabilities. Organizations using Mailpit in development, testing, or staging environments without proper network segmentation or authentication controls are at higher risk. Since the default configuration lacks authentication, many deployments may be exposed to remote exploitation. The vulnerability could disrupt trust in email testing processes and expose internal infrastructure details, potentially aiding attackers in crafting more targeted attacks. However, no known exploits in the wild have been reported to date.

Mitigation Recommendations

To mitigate CVE-2026-27808, organizations should immediately upgrade Mailpit to version 1.29.2 or later, where the vulnerability is fixed. Additionally, implement strict network segmentation to isolate Mailpit servers from sensitive internal networks, minimizing the impact of SSRF attempts. Configure authentication for SMTP and API access to prevent unauthorized remote exploitation. Employ input validation and URL filtering to restrict requests to trusted domains and disallow private or internal IP ranges. Use web application firewalls (WAFs) with SSRF detection rules to monitor and block suspicious outbound requests. Monitor logs for unusual outbound HTTP HEAD requests initiated by Mailpit. If upgrading is temporarily not possible, disable or restrict access to the Link Check API endpoint. Regularly audit and review Mailpit configurations and network access controls to ensure minimal exposure. Educate development and security teams about SSRF risks and secure coding practices to prevent similar issues in custom tools.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-24T02:31:33.267Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f8fb4b7ef31ef0b6dc8d3

Added to database: 2/26/2026, 12:11:32 AM

Last enriched: 2/26/2026, 12:27:28 AM

Last updated: 2/26/2026, 2:27:48 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats