CVE-2025-59937
Wolfi vulnerability analysis and mitigation

Overview

CVE-2025-59937 affects go-mail, a comprehensive library for sending mails with Go, in versions 0.7.0 and below. The vulnerability was discovered and disclosed on September 29, 2025, and involves incorrect handling of mail.Address values when sender or recipient addresses are passed to SMTP client commands. This vulnerability could lead to wrong address routing or ESMTP parameter smuggling (GitHub Advisory).

Technical details

The vulnerability stems from using the raw Address value of mail.Address instead of its String() method, which properly handles escaping and quotation. When a maliciously crafted email address like '"toni.tester@example.com> ORCPT=admin@admin.com"@example.com' is processed, the SMTP client receives the unescaped value, potentially allowing command injection. The vulnerability has been assigned a CVSS v4.0 score of 8.2 (High) with vector string CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N and is classified as CWE-88 (Argument Injection) (GitHub Advisory, Miggo).

Impact

The vulnerability can lead to email misrouting, where messages are delivered to unintended domains. It also enables potential SMTP command injection and parameter smuggling. This could result in data leakage, filter evasion, and bypass of domain-based access controls. The impact is particularly severe when the application allows arbitrary mail address input through web forms or similar interfaces (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been fixed in version 0.7.1 of go-mail. The fix implements proper address encoding by using the String() method of mail.Address for handling email addresses. Users should upgrade to version 0.7.1 or later to address this vulnerability (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Wolfi vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-44005CRITICAL10
  • WolfiWolfi
  • step-certificates
NoYesDec 03, 2025
CVE-2025-66506HIGH7.5
  • PodmanPodman
  • buildah
NoYesDec 04, 2025
CVE-2025-65637HIGH7.5
  • cAdvisorcAdvisor
  • docker-credential-gcr
NoYesDec 04, 2025
CVE-2025-61727MEDIUM6.5
  • cAdvisorcAdvisor
  • prometheus-redis-exporter-fips
NoYesDec 03, 2025
CVE-2025-66406MEDIUM5
  • WolfiWolfi
  • caddy
NoYesDec 03, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management