CVE-2026-42257
net-imap: Command Injection via "raw" arguments to multiple commands
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Prior to versions 0.4.24, 0.5.14, and 0.6.4, several Net::IMAP commands accept a raw string argument that is sent to the server without validation or escaping. If this string is derived from user-controlled input, it may contain contain CRLF sequences, which an attacker can use to inject arbitrary IMAP commands. This issue has been patched in versions 0.4.24, 0.5.14, and 0.6.4.
| CWE | CWE-93 CWE-77 |
| Vendor | ruby |
| Product | net-imap |
| Ecosystems | |
| Industries | Technology |
| Published | May 9, 2026 |
Stay Ahead of the Next One
Get instant alerts for ruby net-imap
Be the first to know when new unknown vulnerabilities affecting ruby net-imap are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
ruby / net-imap
< 0.4.24 >= 0.5.0, < 0.5.14 >= 0.6.0, < 0.6.4