postal-mime is vulnerable to Denial of Service (DoS)
30
Low Risk
Affected versions of this package are vulnerable to a Denial of Service (DoS) attack caused by deeply nested address groups in email headers. A malicious header such as g0: g1: g2: ... gN: user@example.com; can trigger uncontrolled recursion in the address parser, eventually causing a stack overflow and crashing the application. The fix introduces a recursion-depth limit (MAX_NESTED_GROUP_DEPTH = 50), which safely aborts parsing when the structure becomes too deeply nested. This mirrors the mitigation previously applied to the Nodemailer address parser.
You are affected if you are using a version that falls within the vulnerable range.
postal-mime is vulnerable to Denial of Service (DoS) in versions 1.0.0 - 2.6.0.
Upgrade the postal-mime library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant