Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34975: CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection') in useplunk plunk

0
High
VulnerabilityCVE-2026-34975cvecve-2026-34975cwe-93
Published: Mon Apr 06 2026 (04/06/2026, 16:10:05 UTC)
Source: CVE Database V5
Vendor/Project: useplunk
Product: plunk

Description

Plunk is an open-source email platform built on top of AWS SES. Prior to 0.8.0, a CRLF header injection vulnerability was discovered in SESService.ts, where user-supplied values for from.name, subject, custom header keys/values, and attachment filenames were interpolated directly into raw MIME messages without sanitization. An authenticated API user could inject arbitrary email headers (e.g. Bcc, Reply-To) by embedding carriage return/line feed characters in these fields, enabling silent email forwarding, reply redirection, or sender spoofing. The fix adds input validation at the schema level to reject any of these fields containing \r or \n characters, consistent with the existing validation already applied to the contentId field. This vulnerability is fixed in 0.8.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/06/2026, 16:47:43 UTC

Technical Analysis

Plunk versions before 0.8.0 contain a CRLF injection vulnerability (CWE-93) in SESService.ts. This occurs because user inputs for email headers and attachment filenames are not sanitized for carriage return and line feed characters before being inserted into raw MIME email messages. An authenticated API user can exploit this to inject arbitrary email headers such as Bcc or Reply-To, enabling manipulation of email delivery and sender information. The issue is resolved in version 0.8.0 by enforcing schema-level input validation that rejects CRLF characters in these fields, consistent with existing validation for other fields. The vulnerability affects the cloud-hosted service, and the vendor is responsible for patching the environment.

Potential Impact

Successful exploitation allows an authenticated API user to inject arbitrary email headers, which can lead to silent email forwarding, reply redirection, or sender spoofing. This compromises the integrity and confidentiality of email communications sent through the platform. The CVSS score of 8.5 reflects high impact on confidentiality and limited impact on integrity, with no impact on availability.

Mitigation Recommendations

A fix is available in plunk version 0.8.0 that adds input validation to reject carriage return and line feed characters in user-supplied email header fields and attachment filenames. Since plunk is a cloud service, the vendor manages remediation server-side. Users should ensure their environment is updated to version 0.8.0 or later. Check the vendor advisory for confirmation of patch deployment status. No additional mitigation actions are indicated by the vendor.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-31T19:38:31.616Z
Cvss Version
3.1
State
PUBLISHED
Remediation Level
null
Is Cloud Service
true

Threat ID: 69d3dfa80a160ebd92c701d8

Added to database: 4/6/2026, 4:30:32 PM

Last enriched: 4/6/2026, 4:47:43 PM

Last updated: 4/7/2026, 5:44:50 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses