Search for packages
| purl | pkg:maven/io.netty/netty-codec-smtp@4.2.0.Alpha1 |
| Next non-vulnerable version | 4.2.7.Final |
| Latest non-vulnerable version | 4.2.7.Final |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-337s-x5xq-9kc1
Aliases: CVE-2025-59419 GHSA-jq43-27x9-3v86 |
Netty has SMTP Command Injection Vulnerability that Allows Email Forgery An SMTP Command Injection (CRLF Injection) vulnerability in Netty's SMTP codec allows a remote attacker who can control SMTP command parameters (e.g., an email recipient) to forge arbitrary emails from the trusted server. This bypasses standard email authentication and can be used to impersonate executives and forge high-stakes corporate communications. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T16:06:53.485927+00:00 | GHSA Importer | Affected by | VCID-337s-x5xq-9kc1 | https://github.com/advisories/GHSA-jq43-27x9-3v86 | 38.0.0 |