{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-13033","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","state":"PUBLISHED","assignerShortName":"redhat","dateReserved":"2025-11-11T16:15:03.749Z","datePublished":"2025-11-14T19:37:08.224Z","dateUpdated":"2026-05-11T11:26:36.924Z"},"containers":{"cna":{"title":"Nodemailer: nodemailer: email to an unintended domain can occur due to interpretation conflict","metrics":[{"other":{"content":{"value":"Moderate","namespace":"https://access.redhat.com/security/updates/classification/"},"type":"Red Hat severity rating"}},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"},"format":"CVSS"}],"descriptions":[{"lang":"en","value":"A vulnerability was identified in the email parsing library due to improper handling of specially formatted recipient email addresses. An attacker can exploit this flaw by crafting a recipient address that embeds an external address within quotes. This causes the application to misdirect the email to the attacker's external address instead of the intended internal recipient. This could lead to a significant data leak of sensitive information and allow an attacker to bypass security filters and access controls."}],"affected":[{"vendor":"nodemailer","product":"nodemailer","versions":[{"status":"affected","version":"0","lessThan":"7.0.7","versionType":"semver"}],"packageName":"nodemailer","collectionURL":"https://github.com/nodemailer/nodemailer","defaultStatus":"unaffected"},{"vendor":"Red Hat","product":"Red Hat Ceph Storage 8.1","collectionURL":"https://catalog.redhat.com/software/containers/","packageName":"rhceph/grafana-rhel9","defaultStatus":"affected","versions":[{"version":"1777566546","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:ceph_storage:8.1::el9"]},{"vendor":"Red Hat","product":"Red Hat Developer Hub 1.9","collectionURL":"https://catalog.redhat.com/software/containers/","packageName":"rhdh/rhdh-hub-rhel9","defaultStatus":"affected","versions":[{"version":"1772573159","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:rhdh:1.9::el9"]},{"vendor":"Red Hat","product":"Red Hat Advanced Cluster Management for Kubernetes 2","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"rhacm2/acm-grafana-rhel9","defaultStatus":"affected","cpes":["cpe:/a:redhat:acm:2"]}],"references":[{"url":"https://access.redhat.com/errata/RHSA-2026:15979","name":"RHSA-2026:15979","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2026:3751","name":"RHSA-2026:3751","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/security/cve/CVE-2025-13033","tags":["vdb-entry","x_refsource_REDHAT"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402179","name":"RHBZ#2402179","tags":["issue-tracking","x_refsource_REDHAT"]},{"url":"https://github.com/nodemailer/nodemailer"},{"url":"https://github.com/nodemailer/nodemailer/commit/1150d99fba77280df2cfb1885c43df23109a8626"},{"url":"https://github.com/nodemailer/nodemailer/security/advisories/GHSA-mm7p-fcc7-pg87"}],"datePublic":"2025-10-07T13:42:02.000Z","problemTypes":[{"descriptions":[{"cweId":"CWE-1286","description":"Improper Validation of Syntactic Correctness of Input","lang":"en","type":"CWE"}]}],"x_redhatCweChain":"CWE-1286: Improper Validation of Syntactic Correctness of Input","workarounds":[{"lang":"en","value":"Currently there's no available mitigation for this flaw."}],"timeline":[{"lang":"en","time":"2025-10-07T15:03:14.483Z","value":"Reported to Red Hat."},{"lang":"en","time":"2025-10-07T13:42:02.000Z","value":"Made public."}],"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2026-05-11T11:26:36.924Z"},"x_generator":{"engine":"cvelib 1.8.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-11-14T20:00:22.140079Z","id":"CVE-2025-13033","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-11-14T20:00:51.936Z"}}]}}