Mailpit Server-Side Request Forgery
Mailpit Server-Side Request Forgery
Mailpit Server-Side Request Forgery

Mailpit - Server-Side Request Forgery (SSRF)
Advisory ID: Mailpit Server-Side Request Forgery

Mailpit - Server-Side Request Forgery (SSRF)
Advisory ID: RO-26-001
CVE ID: CVE-2026-21859
Severity: Medium
Vendor: axllent
Product: Mailpit
Version: < 1.28.0


Overview #

A Server-Side Request Forgery (SSRF) vulnerability exists in Mailpit's /proxy endpoint that allows attackers to make requests to internal network resources.


Vulnerability Details #

Affected Versions: < 1.28.0

Location: /api/v1/proxy endpoint

Affected Parameter: url

Root Cause: The vulnerability exists due to insufficient validation of user-supplied URLs. Attackers can supply internal URLs that the server will fetch on their behalf.


Exploitation Requirements #

No authentication required
Direct access to the Mailpit web interface

Impact #

Remote attackers can exploit this vulnerability to:

Access internal services (databases, APIs)
Scan internal network resources
Access cloud metadata endpoints (AWS, GCP, Azure)
Potentially pivot to internal systems

Proof of Concept #

GET /api/v1/proxy?url=http://169.254.169.254/latest/meta-data/ HTTP/1.1
Host: mailpit.target.com



Solution #

Upgrade to Mailpit version 1.28.1 or later, which includes proper URL validation for the proxy endpoint.


References #

GitHub Advisory
Mailpit Release Notes

Timeline:

[2026-01-06] - Discovered
[2026-01-07] - Reported
[2026-01-08] - Fixed

Credits: Omar Kurt
Social Media Share
About Contact Terms of Use Privacy Policy
© Khalil Shreateh — Cybersecurity Researcher & White-Hat Hacker — Palestine 🇵🇸
All content is for educational purposes only. Unauthorized use of any information on this site is strictly prohibited.