A flaw was found in mutt before 1.10.1. When "subscribing" to an IMAP mailbox, either via $imap_check_subscribed, or via the
<subscribe> function in the browser menu, the lack of proper input parsing may lead to remote code injection from a malicous IMAP server.
Upstream patch:
References:
http://www.mutt.org/news.htmlhttps://gitlab.com/muttmua/mutt/blob/master/ChangeLog