Improper Neutralization Affecting fetchmail/fetchmail package, versions [5.9.9,6.5.6)[7.0.0-alpha8,7.0.0-alpha11)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (16th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-FETCHMAILFETCHMAIL-13378237
  • published7 Oct 2025
  • disclosed4 Oct 2025
  • creditMatthias Andree

Introduced: 4 Oct 2025

CVE-2025-61962  (opens in a new tab)
CWE-142  (opens in a new tab)

How to fix?

Upgrade fetchmail/fetchmail to version 6.5.6, 7.0.0-alpha11 or higher.

Overview

Affected versions of this package are vulnerable to Improper Neutralization in the SMTP client. An application can crash when authenticating upon receiving a 334 status code without a following blank on the line if esmtpname and esmtppassword options are configured and the plugout and mda options are inactive.

CVSS Base Scores

version 4.0
version 3.1