SMTP Command Injection Vulnerability in Netty Framework
CVE-2025-59419
What is CVE-2025-59419?
The Netty framework, an asynchronous and event-driven network application tool, is impacted by a significant SMTP command injection vulnerability. This flaw arises from inadequate input validation in the SMTP codec, notably within the DefaultSmtpRequest handler. Attackers can exploit this weakness by injecting malicious CRLF characters into SMTP command parameters, leading to unauthorized command execution. This vulnerability allows the crafting of forged emails that appear to originate from a trusted server, bypassing security measures such as SPF and DKIM authentication. The affected versions have been patched in Netty releases 4.1.129.Final and 4.2.8.Final, with no known workarounds available.
Affected Version(s)
netty < 4.2.7.Final < 4.2.7.Final
netty >= 4.2.0.Alpha1, < 4.1.128.Final < 4.2.0.Alpha1, 4.1.128.Final