Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-31582 | go-mail is a comprehensive library for sending mails with Go. In versions 0.7.0 and below, due to incorrect handling of the mail.Address values when a sender- or recipient address is passed to the corresponding MAIL FROM or RCPT TO commands of the SMTP client, there is a possibility of wrong address routing or even ESMTP parameter smuggling. For successful exploitation, it is required that the user's code allows for arbitrary mail address input (i. e. through a web form or similar). If only static mail addresses are used (i. e. in a config file) and the mail addresses in use do not consist of quoted local parts, this should not affect users. This issue is fixed in version 0.7.1 |
Github GHSA |
GHSA-wpwj-69cm-q9c5 | go-mail has insufficient address encoding when passing mail addresses to the SMTP client |
Thu, 16 Oct 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pebcak
Pebcak go-mail |
|
| CPEs | cpe:2.3:a:pebcak:go-mail:*:*:*:*:*:go:*:* | |
| Vendors & Products |
Pebcak
Pebcak go-mail |
|
| Metrics |
cvssV3_1
|
Tue, 30 Sep 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 30 Sep 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Go-mail
Go-mail go-mail |
|
| Vendors & Products |
Go-mail
Go-mail go-mail |
Mon, 29 Sep 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | go-mail is a comprehensive library for sending mails with Go. In versions 0.7.0 and below, due to incorrect handling of the mail.Address values when a sender- or recipient address is passed to the corresponding MAIL FROM or RCPT TO commands of the SMTP client, there is a possibility of wrong address routing or even ESMTP parameter smuggling. For successful exploitation, it is required that the user's code allows for arbitrary mail address input (i. e. through a web form or similar). If only static mail addresses are used (i. e. in a config file) and the mail addresses in use do not consist of quoted local parts, this should not affect users. This issue is fixed in version 0.7.1 | |
| Title | go-mail has insufficient address encoding when passing mail addresses to the SMTP client | |
| Weaknesses | CWE-88 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-09-30T14:44:35.194Z
Reserved: 2025-09-23T14:33:49.505Z
Link: CVE-2025-59937
Updated: 2025-09-30T14:44:28.447Z
Status : Analyzed
Published: 2025-09-29T23:15:31.807
Modified: 2025-10-16T15:55:27.077
Link: CVE-2025-59937
No data.
OpenCVE Enrichment
Updated: 2025-09-30T08:47:34Z
EUVD
Github GHSA