Report: CVE-2026-42257 - net-imap: Command Injection via - Guide

Report: CVE-2026-42257 - net-imap: Command Injection via - Guide

CVE ID :CVE-2026-42257 Published : May 9, 2026, 8:16 p.m. | 1 hour, 39 minutes ago Description :Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Prior to versions 0.4.24, 0.5.14, and 0.6.4, several Net::IMAP commands accept a raw string argument that is sent to the server without validation or escaping. If this string is derived from user-controlled input, it may contain contain CRLF sequences, which an attacker can use to inject arbitrary IMAP commands. This issue has been patched in versions 0.4.24, 0.5.14, and 0.6.4. Severity: 5.8 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVE Details

Severity
MEDIUM
Published
May 9, 2026