๐Ÿ” CVE Alert

CVE-2026-42246

UNKNOWN 0.0

net-imap vulnerable to STARTTLS stripping via invalid response timing

CVSS Score
0.0
EPSS Score
0.1%
EPSS Percentile
16th

Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Prior to versions 0.3.10, 0.4.24, 0.5.14, and 0.6.4, a man-in-the-middle attacker can cause Net::IMAP#starttls to return "successfully", without starting TLS. This issue has been patched in versions 0.3.10, 0.4.24, 0.5.14, and 0.6.4.

CWE CWE-392 CWE-393 CWE-754 CWE-636 CWE-841
Vendor ruby
Product net-imap
Ecosystems
Industries
Technology
Published May 9, 2026
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for ruby net-imap

Be the first to know when new unknown vulnerabilities affecting ruby net-imap are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

ruby / net-imap
< 0.3.10 >= 0.4.0, < 0.4.24 >= 0.5.0, < 0.5.14 >= 0.6.0, < 0.6.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/ruby/net-imap/security/advisories/GHSA-vcgp-9326-pqcp github.com: https://github.com/ruby/net-imap/commit/0ede4c40b1523dfeaf95777b2678e54cc0fd9618 github.com: https://github.com/ruby/net-imap/commit/24a4e770b43230286a05aa2a9746cdbb3eb8485e github.com: https://github.com/ruby/net-imap/commit/97e2488fb5401a1783bddd959dde007d9fbce42c github.com: https://github.com/ruby/net-imap/commit/f79d35bf5833f186e81044c57c843eda30c873da github.com: https://github.com/ruby/net-imap/releases/tag/v0.3.10 github.com: https://github.com/ruby/net-imap/releases/tag/v0.4.24 github.com: https://github.com/ruby/net-imap/releases/tag/v0.5.14