Arbitrary Argument Injection Affecting gitea-fips package, versions <1.24.6-r1


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.05% (15th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CHAINGUARDLATEST-GITEAFIPS-13206467
  • published3 Oct 2025
  • disclosed29 Sept 2025

Introduced: 29 Sep 2025

NewCVE-2025-59937  (opens in a new tab)
CWE-88  (opens in a new tab)

How to fix?

Upgrade Chainguard gitea-fips to version 1.24.6-r1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream gitea-fips package and not the gitea-fips package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

go-mail is a comprehensive library for sending mails with Go. In versions 0.7.0 and below, due to incorrect handling of the mail.Address values when a sender- or recipient address is passed to the corresponding MAIL FROM or RCPT TO commands of the SMTP client, there is a possibility of wrong address routing or even ESMTP parameter smuggling. For successful exploitation, it is required that the user's code allows for arbitrary mail address input (i. e. through a web form or similar). If only static mail addresses are used (i. e. in a config file) and the mail addresses in use do not consist of quoted local parts, this should not affect users. This issue is fixed in version 0.7.1