GHSA-jj37-3377-m6vv: Duplicate Advisory: Nodemailer: Email to an unintended domain can occur due to Interpretation Conflict
(updated )
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-mm7p-fcc7-pg87. This link is maintained to preserve external references.
Original Description
A vulnerability was identified in the email parsing library due to improper handling of specially formatted recipient email addresses. An attacker can exploit this flaw by crafting a recipient address that embeds an external address within quotes. This causes the application to misdirect the email to the attacker’s external address instead of the intended internal recipient. This could lead to a significant data leak of sensitive information and allow an attacker to bypass security filters and access controls.
References
- access.redhat.com/security/cve/CVE-2025-13033
- bugzilla.redhat.com/show_bug.cgi?id=2402179
- github.com/advisories/GHSA-jj37-3377-m6vv
- github.com/nodemailer/nodemailer
- github.com/nodemailer/nodemailer/commit/1150d99fba77280df2cfb1885c43df23109a8626
- github.com/nodemailer/nodemailer/security/advisories/GHSA-mm7p-fcc7-pg87
- nvd.nist.gov/vuln/detail/CVE-2025-13033
Code Behaviors & Features
Detect and mitigate GHSA-jj37-3377-m6vv with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →