Description
** UNSUPPORTED WHEN ASSIGNED ** Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in Pony Mail leading to admin account takeover.

This issue affects all versions of the Lua implementation of Pony Mail. There is a Python implementation under development under the name "Pony Mail Foal" that is not affected by this issue, but hasn't been released yet.

As the Lua implementation of this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.

NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Published: 2026-04-28
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Admin account takeover via HTTP request smuggling
Action: Restrict Access
AI Analysis

Impact

The vulnerability is caused by inconsistent interpretation of HTTP requests in the retired Lua implementation of Apache Pony Mail, allowing an attacker to smuggle HTTP requests and gain administrative privileges. This flaw is classified as CWE-444 and would let an attacker fully compromise the administrative control of the mail server, affecting confidentiality, integrity, and availability.

Affected Systems

The problem affects the deprecated Lua version of Pony Mail from the Apache Software Foundation; all versions released before retirement are impacted. The Python implementation, known as Pony Mail Foal, is not affected, but it has not yet been released. Because the Lua implementation is no longer maintained, there are no vendor patches or updates available.

Risk and Exploitability

The exploit allows remote privilege escalation to full admin rights, making the risk very high. The CVSS score of 9.8 reflects the very high risk. No EPSS score is available and the vulnerability is not listed in the CISA KEV catalog, indicating that public exploit data may be limited, but the potential impact remains severe. Attackers would need the ability to send crafted HTTP requests to the mail server, typically a remote network attacker. Without an official fix, the threat persists until the product is removed or replaced.

Generated by OpenCVE AI on April 28, 2026 at 23:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Limit access to the Pony Mail instance to trusted hosts or authenticated administrators, blocking all external traffic that is not authorized.
  • Replace the retired Lua-based Pony Mail with a supported mail server solution, such as Postfix, Sendmail, or another active project.
  • Apply network level filtering or use a Web Application Firewall that blocks HTTP request smuggling patterns to prevent exploitation, if the service must remain online temporarily.

Generated by OpenCVE AI on April 28, 2026 at 23:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 22:30:00 +0000

Type Values Removed Values Added
References

Tue, 28 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:apache:pony_mail:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 28 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache pony Mail
Vendors & Products Apache
Apache pony Mail

Tue, 28 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Description ** UNSUPPORTED WHEN ASSIGNED ** Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in Pony Mail leading to admin account takeover. This issue affects all versions of the Lua implementation of Pony Mail. There is a Python implementation under development under the name "Pony Mail Foal" that is not affected by this issue, but hasn't been released yet. As the Lua implementation of this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Title Pony Mail: Admin account takeover via request smuggling
Weaknesses CWE-444
References

Subscriptions

Apache Pony Mail
cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2026-04-29T11:55:19.796Z

Reserved: 2026-04-22T09:10:53.326Z

Link: CVE-2026-41873

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2026-04-28T16:16:13.670

Modified: 2026-04-29T13:16:51.850

Link: CVE-2026-41873

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T23:15:43Z

Weaknesses