← Back to CVEs
CVE-2026-22689
MEDIUM6.5
Description
Mailpit is an email testing tool and API for developers. Prior to version 1.28.2, the Mailpit WebSocket server is configured to accept connections from any origin. This lack of Origin header validation introduces a Cross-Site WebSocket Hijacking (CSWSH) vulnerability. An attacker can host a malicious website that, when visited by a developer running Mailpit locally, establishes a WebSocket connection to the victim's Mailpit instance (default ws://localhost:8025). This allows the attacker to intercept sensitive data such as email contents, headers, and server statistics in real-time. This issue has been patched in version 1.28.2.
CVE Details
CVSS v3.1 Score6.5
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionREQUIRED
Published1/10/2026
Last Modified2/18/2026
Sourcenvd
Honeypot Sightings0
Affected Products
axllent:mailpit
Weaknesses (CWE)
CWE-1385
References
https://github.com/axllent/mailpit/commit/6f1f4f34c98989fd873261018fb73830b30aec3f(security-advisories@github.com)
https://github.com/axllent/mailpit/security/advisories/GHSA-524m-q5m7-79mm(security-advisories@github.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.