๐Ÿ” CVE Alert

CVE-2026-30227

UNKNOWN 0.0

MimeKit: CRLF Injection in Quoted Local-Part Enables SMTP Command Injection and Email Forgery

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

MimeKit is a C# library which may be used for the creation and parsing of messages using the Multipurpose Internet Mail Extension (MIME), as defined by numerous IETF specifications. Prior to version 4.15.1, a CRLF injection vulnerability in MimeKit allows an attacker to embed \r\n into the SMTP envelope address local-part (when the local-part is a quoted-string). This is non-compliant with RFC 5321 and can result in SMTP command injection (e.g., injecting additional RCPT TO / DATA / RSET commands) and/or mail header injection, depending on how the application uses MailKit/MimeKit to construct and send messages. The issue becomes exploitable when the attacker can influence a MailboxAddress (MAIL FROM / RCPT TO) value that is later serialized to an SMTP session. RFC 5321 explicitly defines the SMTP mailbox local-part grammar and does not permit CR (13) or LF (10) inside Quoted-string (qtextSMTP and quoted-pairSMTP ranges exclude control characters). SMTP commands are terminated by <CRLF>, making CRLF injection in command arguments particularly dangerous. This issue has been patched in version 4.15.1.

CWE CWE-93
Vendor jstedfast
Product mimekit
Published Mar 6, 2026
Last Updated Mar 9, 2026
Stay Ahead of the Next One

Get instant alerts for jstedfast mimekit

Be the first to know when new unknown vulnerabilities affecting jstedfast mimekit are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

jstedfast / MimeKit
< 4.15.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/jstedfast/MimeKit/security/advisories/GHSA-g7hc-96xr-gvvx