CVE-2025-61084
BaseFortify
Publication date: 2025-11-05
Last updated on: 2025-11-13
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-20 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
| CWE-116 | The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
MDaemon Mail Server 23.5.2 has a vulnerability in how it validates SPF, DKIM, and DMARC. It uses the email address enclosed in angle brackets in the From: header of SMTP DATA for validation. An attacker can exploit this by crafting a From: header containing multiple invisible Unicode thin spaces, which allows them to display a spoofed sender address while still passing the anti-spoofing validation checks.
How can this vulnerability impact me? :
This vulnerability can allow attackers to spoof email senders even when anti-spoofing protections like SPF, DKIM, and DMARC are in place. This can lead to phishing attacks, impersonation, and potentially bypassing email security measures, increasing the risk of fraud or malicious email delivery.