A vulnerability was identified in the email parsing library due to improper handling of specially formatted recipient email addresses. An attacker can exploit this flaw by crafting a recipient address that embeds an external address within quotes. This causes the application to misdirect the email to the attacker's external address instead of the intended internal recipient. This could lead to a significant data leak of sensitive information and allow an attacker to bypass security filters and access controls.
Metrics
Affected Vendors & Products
References
History
Fri, 14 Nov 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 14 Nov 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in the email parsing library due to improper handling of specially formatted recipient email addresses. An attacker can exploit this flaw by crafting a recipient address that embeds an external address within quotes. This causes the application to misdirect the email to the attacker's external address instead of the intended internal recipient. This could lead to a significant data leak of sensitive information and allow an attacker to bypass security filters and access controls. | |
| Title | Nodemailer: nodemailer: email to an unintended domain can occur due to interpretation conflict | |
| First Time appeared |
Redhat
Redhat acm Redhat ceph Storage Redhat rhdh |
|
| Weaknesses | CWE-436 | |
| CPEs | cpe:/a:redhat:acm:2 cpe:/a:redhat:ceph_storage:8 cpe:/a:redhat:rhdh:1 |
|
| Vendors & Products |
Redhat
Redhat acm Redhat ceph Storage Redhat rhdh |
|
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-14T20:00:51.936Z
Reserved: 2025-11-11T16:15:03.749Z
Link: CVE-2025-13033
Updated: 2025-11-14T20:00:42.733Z
Status : Received
Published: 2025-11-14T20:15:45.957
Modified: 2025-11-14T20:15:45.957
Link: CVE-2025-13033
No data.