CRLF Injection Affecting io.netty:netty-codec-smtp package, versions [,4.1.128.Final)[4.2.0.Alpha1,4.2.7.Final)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
2.68% (86th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about CRLF Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-IONETTY-13560334
  • published16 Oct 2025
  • disclosed15 Oct 2025
  • creditDepthFirst Disclosures

Introduced: 15 Oct 2025

NewCVE-2025-59419  (opens in a new tab)
CWE-93  (opens in a new tab)

How to fix?

Upgrade io.netty:netty-codec-smtp to version 4.1.128.Final, 4.2.7.Final or higher.

Overview

Affected versions of this package are vulnerable to CRLF Injection via insufficient input validation in the DefaultSmtpRequest process. An attacker can inject arbitrary SMTP commands by supplying malicious parameters containing CRLF sequences, allowing the sending of forged emails that appear to originate from a trusted server.

CVSS Base Scores

version 4.0
version 3.1