go-mail is a comprehensive library for sending mails with Go. In versions 0.7.0 and below, due to incorrect handling of the mail.Address values when a sender- or recipient address is passed to the corresponding MAIL FROM or RCPT TO commands of the SMTP client, there is a possibility of wrong address routing or even ESMTP parameter smuggling. For successful exploitation, it is required that the user's code allows for arbitrary mail address input (i. e. through a web form or similar). If only static mail addresses are used (i. e. in a config file) and the mail addresses in use do not consist of quoted local parts, this should not affect users. This issue is fixed in version 0.7.1
Metrics
Affected Vendors & Products
References
History
Tue, 30 Sep 2025 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Go-mail
Go-mail go-mail |
|
Vendors & Products |
Go-mail
Go-mail go-mail |
Mon, 29 Sep 2025 22:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | go-mail is a comprehensive library for sending mails with Go. In versions 0.7.0 and below, due to incorrect handling of the mail.Address values when a sender- or recipient address is passed to the corresponding MAIL FROM or RCPT TO commands of the SMTP client, there is a possibility of wrong address routing or even ESMTP parameter smuggling. For successful exploitation, it is required that the user's code allows for arbitrary mail address input (i. e. through a web form or similar). If only static mail addresses are used (i. e. in a config file) and the mail addresses in use do not consist of quoted local parts, this should not affect users. This issue is fixed in version 0.7.1 | |
Title | go-mail has insufficient address encoding when passing mail addresses to the SMTP client | |
Weaknesses | CWE-88 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-09-29T22:21:02.484Z
Updated: 2025-09-29T22:21:02.484Z
Reserved: 2025-09-23T14:33:49.505Z
Link: CVE-2025-59937

No data.

Status : Received
Published: 2025-09-29T23:15:31.807
Modified: 2025-09-29T23:15:31.807
Link: CVE-2025-59937

No data.