Bug 2450780 (CVE-2026-28753) - CVE-2026-28753 NGINX: NGINX Plus: NGINX Open Source: NGINX Plus and NGINX Open Source: Request manipulation via header injection in SMTP upstream requests
Summary: CVE-2026-28753 NGINX: NGINX Plus: NGINX Open Source: NGINX Plus and NGINX Ope...
Keywords:
Status: NEW
Alias: CVE-2026-28753
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2450842
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-03-24 15:02 UTC by OSIDB Bzimport
Modified: 2026-03-24 20:47 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-03-24 15:02:06 UTC
NGINX Plus and NGINX Open Source have a vulnerability in the ngx_mail_smtp_module due to the improper handling of CRLF sequences in DNS responses. This allows an attacker-controlled DNS server to inject arbitrary headers into SMTP upstream requests, leading to potential request manipulation. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.


Note You need to log in before you can comment on or make changes to this bug.