CVE-2025-53859

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_mail_smtp_module that might allow an unauthenticated attacker to over-read NGINX SMTP authentication process memory; as a result, the server side may leak arbitrary bytes sent in a request to the authentication server. This issue happens during the NGINX SMTP authentication process and requires the attacker to make preparations against the target system to extract the leaked data. The issue affects NGINX only if (1) it is built with the ngx_mail_smtp_module, (2) the smtp_auth directive is configured with method "none," and (3) the authentication server returns the "Auth-Wait" response header. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
Link Resource
https://my.f5.com/manage/s/article/K000152786 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r31:-:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r32:-:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r32:p1:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r32:p2:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r33:-:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r33:p1:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r33:p2:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r34:-:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r34:p1:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:*

History

21 Oct 2025, 18:02

Type Values Removed Values Added
First Time F5 nginx Plus
F5 nginx Open Source
F5
References () https://my.f5.com/manage/s/article/K000152786 - () https://my.f5.com/manage/s/article/K000152786 - Vendor Advisory
CPE cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r32:p2:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r32:-:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r32:p1:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r33:p1:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r31:-:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r33:-:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r33:p2:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r34:p1:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r34:-:*:*:*:*:*:*
Summary
  • (es) NGINX Open Source y NGINX Plus presentan una vulnerabilidad en el módulo ngx_mail_smtp_module que podría permitir que un atacante no autenticado sobrelea la memoria del proceso de autenticación SMTP de NGINX. Como resultado, el servidor podría filtrar bytes arbitrarios enviados en una solicitud al servidor de autenticación. Este problema ocurre durante el proceso de autenticación SMTP de NGINX y requiere que el atacante realice preparativos en el sistema objetivo para extraer los datos filtrados. El problema afecta a NGINX solo si (1) se compila con el módulo ngx_mail_smtp_module, (2) la directiva smtp_auth está configurada con el método "none" y (3) el servidor de autenticación devuelve el encabezado de respuesta "Auth-Wait". Nota: Las versiones de software que han alcanzado el fin del soporte técnico (EoTS) no se evalúan.

13 Aug 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-13 15:15

Updated : 2025-10-21 18:02


NVD link : CVE-2025-53859

Mitre link : CVE-2025-53859

CVE.ORG link : CVE-2025-53859


JSON object : View

Products Affected

f5

  • nginx_open_source
  • nginx_plus
CWE
CWE-125

Out-of-bounds Read