Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 10 Jan 2026 18:18:33 +0000
From:      Guido Falsi <madpilot@FreeBSD.org>
To:        ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org
Subject:   git: 6bd3dbdc0101 - main - security/vuxml: security/vuxml: Document mail/mailpit vulnerability (CVE-2026-22689)
Message-ID:  <696297f9.39d0c.11f1a798@gitrepo.freebsd.org>

index | next in thread | raw e-mail

The branch main has been updated by madpilot:

URL: https://cgit.FreeBSD.org/ports/commit/?id=6bd3dbdc010183ef8168fa17454a52626cc62a3e

commit 6bd3dbdc010183ef8168fa17454a52626cc62a3e
Author:     Guido Falsi <madpilot@FreeBSD.org>
AuthorDate: 2026-01-10 18:18:01 +0000
Commit:     Guido Falsi <madpilot@FreeBSD.org>
CommitDate: 2026-01-10 18:18:01 +0000

    security/vuxml: security/vuxml: Document mail/mailpit vulnerability (CVE-2026-22689)
---
 security/vuxml/vuln/2026.xml | 36 ++++++++++++++++++++++++++++++++++++
 1 file changed, 36 insertions(+)

diff --git a/security/vuxml/vuln/2026.xml b/security/vuxml/vuln/2026.xml
index 2ed681d7420c..ec7edeeb1c78 100644
--- a/security/vuxml/vuln/2026.xml
+++ b/security/vuxml/vuln/2026.xml
@@ -1,3 +1,39 @@
+  <vuln vid="d822839e-ee4f-11f0-b53e-0897988a1c07">
+    <topic>mail/mailpit -- Cross-Site WebSocket Hijacking</topic>
+    <affects>
+<package>
+<name>mailpit</name>
+<range><lt>1.28.2</lt></range>
+</package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Mailpit author reports:</p>
+	<blockquote cite="https://github.com/axllent/mailpit/security/advisories/GHSA-524m-q5m7-79mm">;
+	  <p>The Mailpit WebSocket server is configured to accept
+	  connections from any origin. This lack of Origin header
+	  validation introduces a Cross-Site WebSocket Hijacking
+	  (CSWSH) vulnerability.</p>
+
+	  <p>An attacker can host a malicious website that, when
+	  visited by a developer running Mailpit locally, establishes
+	  a WebSocket connection to the victim's Mailpit instance
+	  (default ws://localhost:8025). This allows the attacker
+	  to intercept sensitive data such as email contents,
+	  headers, and server statistics in real-time.</p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2026-22689</cvename>
+      <url>https://github.com/axllent/mailpit/security/advisories/GHSA-524m-q5m7-79mm</url>;
+    </references>
+    <dates>
+      <discovery>2026-01-10</discovery>
+      <entry>2026-01-10</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="79c3c751-ee20-11f0-b17e-50ebf6bdf8e9">
     <topic>phpmyfaq -- multiple vulnerabilities</topic>
     <affects>


home | help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?696297f9.39d0c.11f1a798>