Stalwart is a mail and collaboration server. A denial-of-service vulnerability exists in Stalwart Mail Server versions 0.13.0 through 0.15.4 where accessing a specially crafted email containing malformed nested `message/rfc822` MIME parts via IMAP or JMAP causes excessive CPU and memory consumption, potentially leading to an out-of-memory condition and server crash. The malformed structure causes the `mail-parser` crate to produce cyclical references in its parsed representation, which Stalwart then follows indefinitely. Version 0.15.5 contains a patch.
References
| Link | Resource |
|---|---|
| https://github.com/stalwartlabs/stalwart/security/advisories/GHSA-jm95-876q-c9gw | Vendor Advisory Exploit |
Configurations
History
20 Feb 2026, 19:40
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:stalw:stalwart:*:*:*:*:*:*:*:* | |
| References | () https://github.com/stalwartlabs/stalwart/security/advisories/GHSA-jm95-876q-c9gw - Vendor Advisory, Exploit | |
| First Time |
Stalw
Stalw stalwart |
19 Feb 2026, 21:18
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-19 21:18
Updated : 2026-02-20 19:40
NVD link : CVE-2026-26312
Mitre link : CVE-2026-26312
CVE.ORG link : CVE-2026-26312
JSON object : View
Products Affected
stalw
- stalwart
CWE
CWE-770
Allocation of Resources Without Limits or Throttling
