| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-rfq9-4wcm-64gh | ImapEngine affected by command injection via the ID command parameters |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 17 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 17 Feb 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Directorytree
Directorytree imapengine |
|
| Vendors & Products |
Directorytree
Directorytree imapengine |
Sat, 14 Feb 2026 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Versions of the package directorytree/imapengine before 1.22.3 are vulnerable to Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') via the id() function in ImapConnection.php due to improperly escaping user input before including it in IMAP ID commands. This allows attackers to read or delete victim's emails, terminate the victim's session or execute any valid IMAP command on victim's mailbox by including quote characters " or CRLF sequences \r\n in the input. | |
| Weaknesses | CWE-74 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2026-02-17T20:01:40.343Z
Reserved: 2026-02-13T14:30:50.548Z
Link: CVE-2026-2469
Updated: 2026-02-17T20:01:36.416Z
Status : Awaiting Analysis
Published: 2026-02-14T05:16:22.270
Modified: 2026-02-18T17:52:44.520
Link: CVE-2026-2469
No data.
OpenCVE Enrichment
Updated: 2026-02-17T08:50:04Z
Github GHSA