Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
Currently there's no available mitigation for this flaw.
Fri, 14 Nov 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 14 Nov 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in the email parsing library due to improper handling of specially formatted recipient email addresses. An attacker can exploit this flaw by crafting a recipient address that embeds an external address within quotes. This causes the application to misdirect the email to the attacker's external address instead of the intended internal recipient. This could lead to a significant data leak of sensitive information and allow an attacker to bypass security filters and access controls. | |
| Title | Nodemailer: nodemailer: email to an unintended domain can occur due to interpretation conflict | |
| First Time appeared |
Redhat
Redhat acm Redhat ceph Storage Redhat rhdh |
|
| Weaknesses | CWE-436 | |
| CPEs | cpe:/a:redhat:acm:2 cpe:/a:redhat:ceph_storage:8 cpe:/a:redhat:rhdh:1 |
|
| Vendors & Products |
Redhat
Redhat acm Redhat ceph Storage Redhat rhdh |
|
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-14T20:00:51.936Z
Reserved: 2025-11-11T16:15:03.749Z
Link: CVE-2025-13033
Updated: 2025-11-14T20:00:42.733Z
Status : Received
Published: 2025-11-14T20:15:45.957
Modified: 2025-11-14T20:15:45.957
Link: CVE-2025-13033
No data.
OpenCVE Enrichment
No data.