Impact
The CVE reveals that Serendipity versions 2.6-beta2 and earlier allow a host header injection attack that can be leveraged to inject arbitrary SMTP headers. The vulnerability arises from inserting the raw HTTP_HOST value into the Message-ID header without validation, which can be abused to spoof sender identity, hijack email replies, or degrade sender reputation by embedding a malicious domain. This injection flaw maps to CWE-113 and can result in significant confidentiality and integrity impacts on email communication.
Affected Systems
Affected systems are installations of the s9y:Serendipity PHP weblog engine, specifically versions 2.6-beta2 and any earlier build prior to the release of 2.6.0. The vulnerability is present in the include/functions.inc.php component that handles email notification for comments and subscriptions. Users running unpatched versions of Serendipity that expose an email‑triggering feature should verify their software version against the fix.
Risk and Exploitability
Based on the description, it is inferred that an attacker can craft a request to the site’s comment notification endpoint with a malformed Host header to inject SMTP headers. The CVSS score of 7.2 reflects a high severity, and the lack of an EPSS score means exploitation probability is unknown. The vulnerability is not listed in the KEV catalog, but the potential for email spoofing warrants immediate attention.
OpenCVE Enrichment
Github GHSA