Stalwart is a mail and collaboration server. Versions 0.13.3 and below contain an unbounded memory allocation vulnerability in the IMAP protocol parser which allows remote attackers to exhaust server memory, potentially triggering the system's out-of-memory (OOM) killer and causing a denial of service. The CommandParser implementation enforces size limits on its dynamic buffer in most parsing states, but several state handlers omit these validation checks. This issue is fixed in version 0.13.4. A workaround for this issue is to implement rate limiting and connection monitoring at the network level, however this does not provide complete protection.
Metrics
Affected Vendors & Products
References
History
Fri, 03 Oct 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 03 Oct 2025 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Stalwartlabs
Stalwartlabs stalwart |
|
Vendors & Products |
Stalwartlabs
Stalwartlabs stalwart |
Thu, 02 Oct 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Stalwart is a mail and collaboration server. Versions 0.13.3 and below contain an unbounded memory allocation vulnerability in the IMAP protocol parser which allows remote attackers to exhaust server memory, potentially triggering the system's out-of-memory (OOM) killer and causing a denial of service. The CommandParser implementation enforces size limits on its dynamic buffer in most parsing states, but several state handlers omit these validation checks. This issue is fixed in version 0.13.4. A workaround for this issue is to implement rate limiting and connection monitoring at the network level, however this does not provide complete protection. | |
Title | Unbounded Memory Allocation in Stalwart IMAP parser | |
Weaknesses | CWE-400 CWE-789 |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-10-02T21:30:52.203Z
Updated: 2025-10-03T13:39:45.634Z
Reserved: 2025-09-26T16:25:25.151Z
Link: CVE-2025-61600

Updated: 2025-10-03T13:39:39.296Z

Status : Received
Published: 2025-10-02T22:15:38.063
Modified: 2025-10-02T22:15:38.063
Link: CVE-2025-61600

No data.