CVE-2026-42258 PUBLISHED

net-imap: Command Injection via unvalidated Symbol inputs

Assigner: GitHub_M
Reserved: 26.04.2026 Published: 09.05.2026 Updated: 09.05.2026

Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Prior to versions 0.4.24, 0.5.14, and 0.6.4, symbol arguments to commands are vulnerable to a CRLF Injection / IMAP Command injection via Symbol arguments passed to IMAP commands. This issue has been patched in versions 0.4.24, 0.5.14, and 0.6.4.

Metrics

CVSS Vector: CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:P/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N
CVSS Score: 5.8

Product Status

Vendor ruby
Product net-imap
Versions
  • Version < 0.4.24 is affected
  • Version >= 0.5.0, < 0.5.14 is affected
  • Version >= 0.6.0, < 0.6.4 is affected

References

Problem Types

  • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE
  • CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection') CWE