CVE-2025-61084
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-11-05

Last updated on: 2025-11-13

Assigner: MITRE

Description
MDaemon Mail Server 23.5.2 validates SPF, DKIM, and DMARC using the email enclosed in angle brackets (<>) in the From: header of SMTP DATA. An attacker can craft a From: header with multiple invisible Unicode thin spaces to display a spoofed sender while passing validation, allowing email spoofing even when anti-spoofing protections are in place. NOTE: this is disputed by the Supplier because UI spoofing occurs in a client, not in a server such as MDaemon's product or any other server implementation. Also, if a client without its own spoofing protection must be used, the Header Screening feature in MDaemon's product can be employed to mitigate the client-side vulnerability.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-05
Last Modified
2025-11-13
Generated
2026-05-06
AI Q&A
2025-11-05
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-20 The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
CWE-116 The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

MDaemon Mail Server 23.5.2 has a vulnerability in how it validates SPF, DKIM, and DMARC. It uses the email address enclosed in angle brackets in the From: header of SMTP DATA for validation. An attacker can exploit this by crafting a From: header containing multiple invisible Unicode thin spaces, which allows them to display a spoofed sender address while still passing the anti-spoofing validation checks.


How can this vulnerability impact me? :

This vulnerability can allow attackers to spoof email senders even when anti-spoofing protections like SPF, DKIM, and DMARC are in place. This can lead to phishing attacks, impersonation, and potentially bypassing email security measures, increasing the risk of fraud or malicious email delivery.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart