Impact
A flaw in the Cloudflare Agents SDK’s createHeaderBasedEmailResolver function parses the Message-ID and References headers without proper validation, allowing an attacker who controls those headers to specify any agentName or agentId. By spoofing these headers, the attacker can redirect inbound email traffic to arbitrary Durable Object instances or namespaces, potentially causing unsolicited processing, data exposure, or unintended command execution within those instances.
Affected Systems
The vulnerability affects any deployment of the Cloudflare Agents SDK that uses the createHeaderBasedEmailResolver function, including versions prior to agents@0.3.7. Users of older or unpatched instances are at risk, regardless of the particular namespace or application configuration.
Risk and Exploitability
The CVSS base score is 6.9, indicating moderate severity. The EPSS score is below 1%, suggesting a very low probability of observed exploitation. The vulnerability is not listed in CISA’s KEV catalog. Exploitation requires an attacker to send a crafted email with specific header values; therefore, the attack surface is limited to systems that accept inbound mail through the SDK’s email routing logic.
OpenCVE Enrichment
Github GHSA