7.5
CVE-2025-13033
- EPSS 0.03%
- Veröffentlicht 14.11.2025 19:37:08
- Zuletzt bearbeitet 04.03.2026 16:16:24
- Quelle secalert@redhat.com
- CVE-Watchlists
- Unerledigt
A vulnerability was identified in the email parsing library due to improper handling of specially formatted recipient email addresses. An attacker can exploit this flaw by crafting a recipient address that embeds an external address within quotes. This causes the application to misdirect the email to the attacker's external address instead of the intended internal recipient. This could lead to a significant data leak of sensitive information and allow an attacker to bypass security filters and access controls.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Herstellernodemailer
≫
Produkt
nodemailer
Default Statusunaffected
Version <
7.0.7
Version
0
Status
affected
HerstellerRed Hat
≫
Produkt
Red Hat Developer Hub 1.9
Default Statusaffected
Version <
*
Version
sha256:141aeba778033153ed7005785565c8f3a00f6353be7bb3fd9124d8ad9375d988
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Advanced Cluster Management for Kubernetes 2
Default Statusaffected
HerstellerRed Hat
≫
Produkt
Red Hat Ceph Storage 8
Default Statusaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.092 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| secalert@redhat.com | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
CWE-1286 Improper Validation of Syntactic Correctness of Input
The product receives input that is expected to be well-formed - i.e., to comply with a certain syntax - but it does not validate or incorrectly validates that the input complies with the syntax.