Description
Stalwart is a mail and collaboration server. A denial-of-service vulnerability exists in Stalwart Mail Server versions 0.13.0 through 0.15.4 where accessing a specially crafted email containing malformed nested `message/rfc822` MIME parts via IMAP or JMAP causes excessive CPU and memory consumption, potentially leading to an out-of-memory condition and server crash. The malformed structure causes the `mail-parser` crate to produce cyclical references in its parsed representation, which Stalwart then follows indefinitely. Version 0.15.5 contains a patch.
Published: 2026-02-19
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Out-of-Memory Denial of Service
Action: Patch ASAP
AI Analysis

Impact

A malformed MIME structure in Stalwart Mail Server emails triggers the mail-parser crate to create circular references. The server follows these references indefinitely, consuming excessive CPU and memory until the process crashes. The vulnerability is a classic resource exhaustion flaw, categorized as CWE-770, that can halt mail service availability without compromising confidentiality or integrity.

Affected Systems

Stalwart Mail Server versions 0.13.0 through 0.15.4 are affected. All deployments that expose IMAP or JMAP interfaces to potentially hostile external users could be impacted. Version 0.15.5 includes the required patch.

Risk and Exploitability

The CVSS score of 6.5 indicates moderate severity, but the EPSS score of less than 1% suggests a low probability of exploitation under current conditions. The attack vector is inferred to be remote, requiring an attacker to send a specifically crafted email via IMAP or JMAP. Once the malicious message is accessed, the server experiences rapid resource drain, leading to an out-of-memory condition and crash.

Generated by OpenCVE AI on April 17, 2026 at 17:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Stalwart Mail Server to version 0.15.5 or later, which contains the fix for the parser cycle issue.
  • If an upgrade is not immediately possible, monitor memory and CPU utilization of the mail-parser process and limit concurrent parsing of large or deeply nested messages.
  • Configure firewall or access controls to restrict IMAP/JMAP access to trusted clients, and consider implementing rate limits to reduce the chance of a resource exhaustion attack.

Generated by OpenCVE AI on April 17, 2026 at 17:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Feb 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Stalw
Stalw stalwart
CPEs cpe:2.3:a:stalw:stalwart:*:*:*:*:*:*:*:*
Vendors & Products Stalw
Stalw stalwart

Fri, 20 Feb 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Stalwartlabs
Stalwartlabs stalwart
Vendors & Products Stalwartlabs
Stalwartlabs stalwart

Thu, 19 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Description Stalwart is a mail and collaboration server. A denial-of-service vulnerability exists in Stalwart Mail Server versions 0.13.0 through 0.15.4 where accessing a specially crafted email containing malformed nested `message/rfc822` MIME parts via IMAP or JMAP causes excessive CPU and memory consumption, potentially leading to an out-of-memory condition and server crash. The malformed structure causes the `mail-parser` crate to produce cyclical references in its parsed representation, which Stalwart then follows indefinitely. Version 0.15.5 contains a patch.
Title Stalwart Mail Server has Out-of-Memory Denial of Service via Malformed Nested MIME Messages
Weaknesses CWE-770
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Stalw Stalwart
Stalwartlabs Stalwart
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-20T19:58:25.519Z

Reserved: 2026-02-13T16:27:51.806Z

Link: CVE-2026-26312

cve-icon Vulnrichment

Updated: 2026-02-20T19:58:09.368Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-19T21:18:31.823

Modified: 2026-02-20T19:40:52.817

Link: CVE-2026-26312

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T18:00:12Z

Weaknesses