PT-2026-30675 · Plunk+1 · Plunk+1
Romain-Deperne
·
Published
2026-04-06
·
Updated
2026-04-06
·
CVE-2026-34975
CVSS v3.1
8.5
High
| AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N |
Name of the Vulnerable Software and Affected Versions
Plunk versions prior to 0.8.0
Description
Plunk, an email platform built on AWS SES, had a CRLF header injection issue in the SESService.ts component. User-provided data for
from.name, subject, custom header keys/values, and attachment filenames was directly included in raw MIME messages without proper sanitization. An authenticated API user could inject arbitrary email headers, such as Bcc or Reply-To, by embedding carriage return/line feed characters into these fields, potentially enabling silent email forwarding, reply redirection, or sender spoofing.Recommendations
Update to version 0.8.0 or later.
Fix
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Aws Ses
Plunk