Vulnerability Details CVE-2026-28753
NGINX Plus and NGINX Open Source have a vulnerability in the ngx_mail_smtp_module module due to the improper handling of CRLF sequences in DNS responses. This allows an attacker-controlled DNS server to inject arbitrary headers into SMTP upstream requests, leading to potential request manipulation. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 3.9%
CVSS Severity
CVSS v3 Score 3.7
Products affected by CVE-2026-28753
-
cpe:2.3:a:f5:nginx_open_source:*
-
cpe:2.3:a:f5:nginx_open_source:1.25.0
-
cpe:2.3:a:f5:nginx_open_source:1.25.1
-
cpe:2.3:a:f5:nginx_open_source:1.25.2
-
cpe:2.3:a:f5:nginx_open_source:1.25.3
-
cpe:2.3:a:f5:nginx_open_source:1.25.4
-
cpe:2.3:a:f5:nginx_open_source:1.26.1
-
cpe:2.3:a:f5:nginx_open_source:1.26.2
-
cpe:2.3:a:f5:nginx_open_source:1.27.0
-
cpe:2.3:a:f5:nginx_open_source:1.28.2
-
cpe:2.3:a:f5:nginx_open_source:1.29.0
-
cpe:2.3:a:f5:nginx_open_source:1.29.5
-
cpe:2.3:a:f5:nginx_open_source:1.3.0
-
cpe:2.3:a:f5:nginx_open_source:1.5.13
-
cpe:2.3:a:f5:nginx_plus:r32
-
cpe:2.3:a:f5:nginx_plus:r33
-
cpe:2.3:a:f5:nginx_plus:r34
-
cpe:2.3:a:f5:nginx_plus:r35
-
cpe:2.3:a:f5:nginx_plus:r36