CVE-2025-13033

NameCVE-2025-13033
DescriptionA vulnerability was identified in the email parsing library due to improper handling of specially formatted recipient email addresses. An attacker can exploit this flaw by crafting a recipient address that embeds an external address within quotes. This causes the application to misdirect the email to the attacker's external address instead of the intended internal recipient. This could lead to a significant data leak of sensitive information and allow an attacker to bypass security filters and access controls.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
node-nodemailer (PTS)bullseye6.4.17-3vulnerable
bookworm6.8.0+~6.4.6-1vulnerable
trixie6.10.0+~6.4.17-1vulnerable
forky, sid7.0.10+~7.0.2-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
node-nodemailersource(unstable)7.0.9+~7.0.2-1

Notes

[trixie] - node-nodemailer <no-dsa> (Minor issue)
[bookworm] - node-nodemailer <no-dsa> (Minor issue)
[bullseye] - node-nodemailer <postponed> (Minor issue)
https://github.com/nodemailer/nodemailer/security/advisories/GHSA-mm7p-fcc7-pg87
Fixed by: https://github.com/nodemailer/nodemailer/commit/1150d99fba77280df2cfb1885c43df23109a8626 (v7.0.7)

Search for package or bug name: Reporting problems