Report: CVE-2026-41319 - MailKit has STARTTLS Response Injection via unflushed stream buffer that enables

Report: CVE-2026-41319 - MailKit has STARTTLS Response Injection via unflushed stream buffer that enables

CVE ID :CVE-2026-41319 Published : April 24, 2026, 4:16 a.m. | 1 hour, 33 minutes ago Description :MailKit is a cross-platform mail client library built on top of MimeKit. A STARTTLS Response Injection vulnerability in versions prior to 4.16.0 allows a Man-in-the-Middle attacker to inject arbitrary protocol responses across the plaintext-to-TLS trust boundary, enabling SASL authentication mechanism downgrade (e.g., forcing PLAIN instead of SCRAM-SHA-256). The internal read buffer in `SmtpStream`, `ImapStream`, and `Pop3Stream` is not flushed when the underlying stream is replaced with `SslStream` during STARTTLS upgrade, causing pre-TLS attacker-injected data to be processed as trusted post-TLS responses. Version 4.16.0 patches the issue. Severity: 6.5 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVE Details

Severity
MEDIUM
Published
April 24, 2026