Description
Mailpit is an email testing tool and API for developers. Versions prior to 1.28.3 are vulnerable to Server-Side Request Forgery (SSRF) via HTML Check CSS Download. The HTML Check feature (`/api/v1/message/{ID}/html-check`) is designed to analyze HTML emails for compatibility. During this process, the `inlineRemoteCSS()` function automatically downloads CSS files from external `<link rel="stylesheet" href="...">` tags to inline them for testing. Version 1.28.3 fixes the issue.
Published: 2026-01-19
Score: 5.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery (SSRF)
Action: Apply Patch
AI Analysis

Impact

Mailpit, an email testing tool and API for developers, contains a server‑side request forgery flaw in versions older than 1.28.3. The vulnerability resides in the HTML Check feature, which automatically fetches CSS files linked within an email in order to inline them for compatibility testing. An attacker can supply a crafted <link> tag that points to any internal or external resource, causing the Mailpit server to retrieve it. This allows the attacker to access internal network services, exfiltrate data, or perform further malicious activity. The weakness is classified as CWE‑918.

Affected Systems

axllent Mailpit versions prior to 1.28.3 are impacted. The affected releases are those below the 1.28.3 tag released in August 2026. All deployments using these older binaries are vulnerable regardless of service configuration.

Risk and Exploitability

The CVSS score for this flaw is 5.8, indicating a moderate severity. The EPSS score is below 1 %, suggesting the likelihood of exploitation in the near future is low. The flaw is not listed in the CISA KEV catalog. Because the API endpoint can be triggered via normal HTTP requests, the attack vector depends on whether the endpoint is exposed to the public internet or limited to trusted users. If the endpoint is publicly accessible, an unauthenticated or authenticated attacker could abuse SSRF to reach arbitrary internal hosts. If access is restricted, the risk is mitigated by limiting the reach of the request.

Generated by OpenCVE AI on April 18, 2026 at 05:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade axllent Mailpit to version 1.28.3 or newer.
  • If upgrading cannot be performed immediately, restrict network access to the /api/v1/message/{ID}/html-check endpoint so that only trusted networks or users can reach it.
  • Consider disabling the inlineRemoteCSS feature or validating CSS URLs to ensure they point only to trusted domains.

Generated by OpenCVE AI on April 18, 2026 at 05:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-6jxm-fv7w-rw5j Mailpit has a Server-Side Request Forgery (SSRF) via HTML Check API
History

Thu, 05 Feb 2026 18:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:axllent:mailpit:*:*:*:*:*:*:*:*

Tue, 20 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 20 Jan 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Axllent
Axllent mailpit
Vendors & Products Axllent
Axllent mailpit

Mon, 19 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Description Mailpit is an email testing tool and API for developers. Versions prior to 1.28.3 are vulnerable to Server-Side Request Forgery (SSRF) via HTML Check CSS Download. The HTML Check feature (`/api/v1/message/{ID}/html-check`) is designed to analyze HTML emails for compatibility. During this process, the `inlineRemoteCSS()` function automatically downloads CSS files from external `<link rel="stylesheet" href="...">` tags to inline them for testing. Version 1.28.3 fixes the issue.
Title Mailpit Vulnerable to Server-Side Request Forgery (SSRF) via HTML Check API
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 5.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-20T20:05:35.862Z

Reserved: 2026-01-16T15:46:40.842Z

Link: CVE-2026-23845

cve-icon Vulnrichment

Updated: 2026-01-20T20:04:05.285Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-19T19:16:04.820

Modified: 2026-02-05T18:35:31.477

Link: CVE-2026-23845

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T05:15:15Z

Weaknesses