NGINX Open Source and NGINX Plus Vulnerability in SMTP Module
CVE-2025-53859

6.3MEDIUM

Key Information:

Vendor

F5

Vendor
CVE Published:
13 August 2025

What is CVE-2025-53859?

CVE-2025-53859 is a vulnerability identified in the NGINX Open Source and NGINX Plus web server software, specifically within the ngx_mail_smtp_module. This vulnerability allows an unauthenticated attacker to exploit the SMTP authentication process, potentially leading to unauthorized leakage of sensitive data from the server memory. The threat arises when the NGINX server is configured with the smtp_auth directive set to "none" and is built with the ngx_mail_smtp_module enabled. This situation could allow an attacker, after making initial preparatory steps against the target system, to retrieve arbitrary bytes sent to the authentication server during the SMTP authentication phase. Consequently, organizations running affected versions of NGINX may face serious security risks, as such vulnerabilities can facilitate further exploits, data exposure, or compromise of server integrity.

Potential impact of CVE-2025-53859

  1. Data Leakage: The vulnerability can lead to the exposure of sensitive information stored in memory, potentially revealing passwords or other confidential data during the SMTP authentication procedure.

  2. Unauthorized Access: By successfully exploiting this vulnerability, attackers could gain unauthorized access to SMTP communication, allowing them to intercept or manipulate email traffic, which may lead to broader security breaches.

  3. Increased Attack Surface: Organizations vulnerable to this exploit may experience heightened risk from follow-on attacks, as compromised authentication processes can serve as entry points for further exploitation or lateral movement within networks.

Affected Version(s)

NGINX Open Source 0.7 < 1.29.1

NGINX Plus R34

NGINX Plus R33

References

CVSS V4

Score:
6.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

F5 acknowledges the Amazon Web Services Security team for bringing this issue to our attention and following the highest standards of coordinated disclosure.
.