CVE-2025-59937

go-mail is a comprehensive library for sending mails with Go. In versions 0.7.0 and below, due to incorrect handling of the mail.Address values when a sender- or recipient address is passed to the corresponding MAIL FROM or RCPT TO commands of the SMTP client, there is a possibility of wrong address routing or even ESMTP parameter smuggling. For successful exploitation, it is required that the user's code allows for arbitrary mail address input (i. e. through a web form or similar). If only static mail addresses are used (i. e. in a config file) and the mail addresses in use do not consist of quoted local parts, this should not affect users. This issue is fixed in version 0.7.1
Configurations

Configuration 1 (hide)

cpe:2.3:a:pebcak:go-mail:*:*:*:*:*:go:*:*

History

No history.

Information

Published : 2025-09-29 23:15

Updated : 2025-10-16 15:55


NVD link : CVE-2025-59937

Mitre link : CVE-2025-59937

CVE.ORG link : CVE-2025-59937


JSON object : View

Products Affected

pebcak

  • go-mail
CWE
CWE-88

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')