Impact
The vulnerability resides in Nodemailer's smtp_server, specifically within the SMTPStream._write component of lib/smtp-stream.js. A remote attacker can leverage this flaw to make the server unresponsive, resulting in a denial‑of‑service condition. The weakness is classified under CWE‑400 and does not allow code execution or data disclosure.
Affected Systems
The affected product is Nodemailer's smtp_server. Any installation using a version older than 3.18.3 is vulnerable. The official fix is available in release v3.18.3 on GitHub.
Risk and Exploitability
The CVSS severity score is 7.5, indicating a high level of risk. Because no EPSS score is reported and the vulnerability is not listed in CISA's KEV catalog, the overall exploitation probability is unknown, yet the DoS impact can be significant if the SMTP server is exposed to the internet. The flaw can be triggered remotely by sending crafted SMTP commands to the _write method. A straightforward mitigation is to upgrade the library; otherwise, limiting exposure via network controls can reduce risk.
OpenCVE Enrichment