CVE-2026-34975: CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection') in useplunk plunk
Plunk is an open-source email platform built on top of AWS SES. Prior to 0.8.0, a CRLF header injection vulnerability was discovered in SESService.ts, where user-supplied values for from.name, subject, custom header keys/values, and attachment filenames were interpolated directly into raw MIME messages without sanitization. An authenticated API user could inject arbitrary email headers (e.g. Bcc, Reply-To) by embedding carriage return/line feed characters in these fields, enabling silent email forwarding, reply redirection, or sender spoofing. The fix adds input validation at the schema level to reject any of these fields containing \r or \n characters, consistent with the existing validation already applied to the contentId field. This vulnerability is fixed in 0.8.0.
AI Analysis
Technical Summary
Plunk versions before 0.8.0 contain a CRLF injection vulnerability (CWE-93) in SESService.ts. This occurs because user inputs for email headers and attachment filenames are not sanitized for carriage return and line feed characters before being inserted into raw MIME email messages. An authenticated API user can exploit this to inject arbitrary email headers such as Bcc or Reply-To, enabling manipulation of email delivery and sender information. The issue is resolved in version 0.8.0 by enforcing schema-level input validation that rejects CRLF characters in these fields, consistent with existing validation for other fields. The vulnerability affects the cloud-hosted service, and the vendor is responsible for patching the environment.
Potential Impact
Successful exploitation allows an authenticated API user to inject arbitrary email headers, which can lead to silent email forwarding, reply redirection, or sender spoofing. This compromises the integrity and confidentiality of email communications sent through the platform. The CVSS score of 8.5 reflects high impact on confidentiality and limited impact on integrity, with no impact on availability.
Mitigation Recommendations
A fix is available in plunk version 0.8.0 that adds input validation to reject carriage return and line feed characters in user-supplied email header fields and attachment filenames. Since plunk is a cloud service, the vendor manages remediation server-side. Users should ensure their environment is updated to version 0.8.0 or later. Check the vendor advisory for confirmation of patch deployment status. No additional mitigation actions are indicated by the vendor.
CVE-2026-34975: CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection') in useplunk plunk
Description
Plunk is an open-source email platform built on top of AWS SES. Prior to 0.8.0, a CRLF header injection vulnerability was discovered in SESService.ts, where user-supplied values for from.name, subject, custom header keys/values, and attachment filenames were interpolated directly into raw MIME messages without sanitization. An authenticated API user could inject arbitrary email headers (e.g. Bcc, Reply-To) by embedding carriage return/line feed characters in these fields, enabling silent email forwarding, reply redirection, or sender spoofing. The fix adds input validation at the schema level to reject any of these fields containing \r or \n characters, consistent with the existing validation already applied to the contentId field. This vulnerability is fixed in 0.8.0.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Plunk versions before 0.8.0 contain a CRLF injection vulnerability (CWE-93) in SESService.ts. This occurs because user inputs for email headers and attachment filenames are not sanitized for carriage return and line feed characters before being inserted into raw MIME email messages. An authenticated API user can exploit this to inject arbitrary email headers such as Bcc or Reply-To, enabling manipulation of email delivery and sender information. The issue is resolved in version 0.8.0 by enforcing schema-level input validation that rejects CRLF characters in these fields, consistent with existing validation for other fields. The vulnerability affects the cloud-hosted service, and the vendor is responsible for patching the environment.
Potential Impact
Successful exploitation allows an authenticated API user to inject arbitrary email headers, which can lead to silent email forwarding, reply redirection, or sender spoofing. This compromises the integrity and confidentiality of email communications sent through the platform. The CVSS score of 8.5 reflects high impact on confidentiality and limited impact on integrity, with no impact on availability.
Mitigation Recommendations
A fix is available in plunk version 0.8.0 that adds input validation to reject carriage return and line feed characters in user-supplied email header fields and attachment filenames. Since plunk is a cloud service, the vendor manages remediation server-side. Users should ensure their environment is updated to version 0.8.0 or later. Check the vendor advisory for confirmation of patch deployment status. No additional mitigation actions are indicated by the vendor.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-31T19:38:31.616Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
- Is Cloud Service
- true
Threat ID: 69d3dfa80a160ebd92c701d8
Added to database: 4/6/2026, 4:30:32 PM
Last enriched: 4/6/2026, 4:47:43 PM
Last updated: 4/7/2026, 5:44:50 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.