6.3

CVE-2026-28753

NGINX ngx_mail_proxy_module vulnerability

NGINX Plus and NGINX Open Source have a vulnerability in the ngx_mail_smtp_module module due to the improper handling of CRLF sequences in DNS responses. This allows an attacker-controlled DNS server to inject arbitrary headers into SMTP upstream requests, leading to potential request manipulation. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
F5Nginx Plus Versionr32 Updatep1
F5Nginx Plus Versionr32 Updatep2
F5Nginx Plus Versionr32 Updatep3
F5Nginx Plus Versionr32 Updatep4
F5Nginx Plus Versionr33
F5Nginx Plus Versionr33 Updatep1
F5Nginx Plus Versionr33 Updatep2
F5Nginx Plus Versionr33 Updatep3
F5Nginx Plus Versionr34
F5Nginx Plus Versionr34 Updatep1
F5Nginx Plus Versionr34 Updatep2
F5Nginx Plus Versionr35
F5Nginx Plus Versionr35 Updatep1
F5Nginx Plus Versionr36
F5Nginx Plus Versionr36 Updatep1
F5Nginx Plus Versionr36 Updatep2
F5Nginx Open Source Version >= 0.6.27 <= 0.9.7
F5Nginx Open Source Version >= 1.0.0 < 1.28.3
F5Nginx Open Source Version >= 1.29.0 < 1.29.7
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.068
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
f5sirt@f5.com 3.7 2.2 1.4
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
f5sirt@f5.com 6.3 0 0
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
CWE-93 Improper Neutralization of CRLF Sequences ('CRLF Injection')

The product uses CRLF (carriage return line feeds) as a special element, e.g. to separate lines or records, but it does not neutralize or incorrectly neutralizes CRLF sequences from inputs.