Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 20 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Feb 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Stalw
Stalw stalwart |
|
| CPEs | cpe:2.3:a:stalw:stalwart:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Stalw
Stalw stalwart |
Fri, 20 Feb 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Stalwartlabs
Stalwartlabs stalwart |
|
| Vendors & Products |
Stalwartlabs
Stalwartlabs stalwart |
Thu, 19 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Stalwart is a mail and collaboration server. A denial-of-service vulnerability exists in Stalwart Mail Server versions 0.13.0 through 0.15.4 where accessing a specially crafted email containing malformed nested `message/rfc822` MIME parts via IMAP or JMAP causes excessive CPU and memory consumption, potentially leading to an out-of-memory condition and server crash. The malformed structure causes the `mail-parser` crate to produce cyclical references in its parsed representation, which Stalwart then follows indefinitely. Version 0.15.5 contains a patch. | |
| Title | Stalwart Mail Server has Out-of-Memory Denial of Service via Malformed Nested MIME Messages | |
| Weaknesses | CWE-770 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-20T19:58:25.519Z
Reserved: 2026-02-13T16:27:51.806Z
Link: CVE-2026-26312
Updated: 2026-02-20T19:58:09.368Z
Status : Analyzed
Published: 2026-02-19T21:18:31.823
Modified: 2026-02-20T19:40:52.817
Link: CVE-2026-26312
No data.
OpenCVE Enrichment
Updated: 2026-04-17T18:00:12Z