SMTP Command Injection Vulnerability in Netty Framework
CVE-2025-59419
What is CVE-2025-59419?
The Netty framework, an asynchronous and event-driven network application tool, is impacted by a significant SMTP command injection vulnerability. This flaw arises from inadequate input validation in the SMTP codec, notably within the DefaultSmtpRequest handler. Attackers can exploit this weakness by injecting malicious CRLF characters into SMTP command parameters, leading to unauthorized command execution. This vulnerability allows the crafting of forged emails that appear to originate from a trusted server, bypassing security measures such as SPF and DKIM authentication. The affected versions have been patched in Netty releases 4.1.129.Final and 4.2.8.Final, with no known workarounds available.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
netty < 4.2.7.Final < 4.2.7.Final
netty >= 4.2.0.Alpha1, < 4.1.128.Final < 4.2.0.Alpha1, 4.1.128.Final
References
CVSS V4
Timeline
Vulnerability published
Vulnerability Reserved
