Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-23845

CVE-2026-23845: Mailpit SSRF Vulnerability

CVE-2026-23845 is a Server-Side Request Forgery flaw in Mailpit's HTML Check feature that exploits CSS downloads. Attackers can forge requests via external stylesheets. This article covers technical details, affected versions, and patches.

Published: January 23, 2026

CVE-2026-23845 Overview

CVE-2026-23845 is a Server-Side Request Forgery (SSRF) vulnerability affecting Mailpit, an email testing tool and API for developers. The vulnerability exists in versions prior to 1.28.3 and allows attackers to exploit the HTML Check feature to make unauthorized requests to internal or external resources.

The flaw resides in the inlineRemoteCSS() function, which automatically downloads CSS files from external <link rel="stylesheet" href="..."> tags during HTML email compatibility analysis. By crafting malicious HTML emails with specially crafted stylesheet links, an attacker can force the Mailpit server to make requests to arbitrary URLs, potentially accessing internal network resources or cloud metadata services.

Critical Impact

Attackers can leverage this SSRF vulnerability to probe internal network infrastructure, access cloud instance metadata services, or exfiltrate sensitive configuration data from systems behind the firewall where Mailpit is deployed.

Affected Products

  • Mailpit versions prior to 1.28.3

Discovery Timeline

  • 2026-01-19 - CVE CVE-2026-23845 published to NVD
  • 2026-01-19 - Last updated in NVD database

Technical Details for CVE-2026-23845

Vulnerability Analysis

This Server-Side Request Forgery vulnerability is classified under CWE-918 (Server-Side Request Forgery). The vulnerability exists in the HTML Check API endpoint (/api/v1/message/{ID}/html-check), which is designed to analyze HTML emails for compatibility across email clients.

The core issue stems from insufficient validation of URLs in the inlineRemoteCSS() function. When processing HTML emails containing external stylesheet references, the function downloads CSS content from specified URLs without proper restrictions on the destination. This allows an attacker to craft malicious HTML content that triggers requests to arbitrary destinations, including internal network resources, localhost services, or cloud metadata endpoints.

The attack can be executed remotely without authentication and does not require user interaction. The vulnerability has a changed scope, meaning the vulnerable component (Mailpit) can impact resources beyond its security scope, such as internal network services.

Root Cause

The root cause is inadequate URL validation and lack of network-level restrictions in the inlineRemoteCSS() function. When processing external CSS links in HTML emails, the application fails to:

  1. Validate that target URLs resolve to external, non-private IP addresses
  2. Block requests to localhost, internal network ranges, or cloud metadata services
  3. Implement proper network context isolation for outbound requests

Attack Vector

An attacker exploits this vulnerability by:

  1. Crafting an HTML email containing a malicious <link rel="stylesheet" href="..."> tag pointing to an internal resource or sensitive endpoint
  2. Sending or uploading this email to a Mailpit instance
  3. Triggering the HTML Check feature via the /api/v1/message/{ID}/html-check API endpoint
  4. The server-side inlineRemoteCSS() function attempts to fetch the CSS from the attacker-specified URL
  5. The attacker receives information about internal services or retrieves sensitive data through the response

Example attack payloads might include references to cloud metadata services (e.g., http://169.254.169.254/latest/meta-data/) or internal services (e.g., http://localhost:8080/admin).

The security patch addresses this by adding network-level restrictions, as shown in the commit:

go
 package htmlcheck
 
 import (
+	"context"
+	"errors"
 	"fmt"
 	"io"
+	"net"
 	"net/http"
 	"net/url"
 	"strings"

Source: GitHub Commit Details

The patch introduces context, errors, and net packages to implement proper network validation, likely adding checks to prevent requests to private IP ranges and localhost addresses.

Detection Methods for CVE-2026-23845

Indicators of Compromise

  • Unusual outbound HTTP requests from the Mailpit server to internal IP ranges (10.x.x.x, 172.16.x.x-172.31.x.x, 192.168.x.x)
  • Requests to cloud metadata endpoints (169.254.169.254) originating from the Mailpit process
  • Anomalous access patterns to the /api/v1/message/{ID}/html-check endpoint with crafted email IDs
  • Network connections from Mailpit to localhost services on unexpected ports

Detection Strategies

  • Monitor API access logs for the /api/v1/message/{ID}/html-check endpoint and correlate with subsequent outbound network connections
  • Implement network monitoring to detect requests from the Mailpit server to RFC1918 private address spaces or link-local addresses
  • Configure application firewall rules to alert on suspicious URL patterns in HTML email content submitted to Mailpit
  • Review Mailpit logs for CSS download failures or unexpected connection attempts

Monitoring Recommendations

  • Deploy network-level monitoring on the Mailpit server to track all outbound HTTP requests
  • Set up alerts for any Mailpit process attempting to connect to internal services or cloud metadata endpoints
  • Implement rate limiting and anomaly detection on the HTML Check API endpoint
  • Enable verbose logging for the HTML Check feature to capture all CSS download attempts

How to Mitigate CVE-2026-23845

Immediate Actions Required

  • Upgrade Mailpit to version 1.28.3 or later immediately
  • Review network logs for any exploitation attempts targeting the HTML Check API
  • Implement network segmentation to restrict Mailpit's access to internal resources
  • Consider temporarily disabling the HTML Check feature if immediate upgrade is not possible

Patch Information

The vulnerability has been fixed in Mailpit version 1.28.3. The security patch adds network-level restrictions to prevent SSRF attacks by validating destination URLs and blocking requests to private IP ranges. For detailed information about the fix, refer to:

  • GitHub Security Advisory GHSA-6jxm-fv7w-rw5j
  • GitHub Release v1.28.3
  • GitHub Commit Details

Workarounds

  • Restrict network egress from the Mailpit server using firewall rules to block access to internal networks and cloud metadata services
  • Deploy Mailpit in an isolated network segment without access to sensitive internal resources
  • Use a web application firewall (WAF) to filter malicious HTML content before it reaches Mailpit
  • Disable the HTML Check feature entirely if not required for your use case
bash
# Configuration example - Firewall rules to block SSRF attempts
# Block outbound connections to internal networks from Mailpit server
iptables -A OUTPUT -m owner --uid-owner mailpit -d 10.0.0.0/8 -j DROP
iptables -A OUTPUT -m owner --uid-owner mailpit -d 172.16.0.0/12 -j DROP
iptables -A OUTPUT -m owner --uid-owner mailpit -d 192.168.0.0/16 -j DROP
iptables -A OUTPUT -m owner --uid-owner mailpit -d 169.254.169.254 -j DROP
iptables -A OUTPUT -m owner --uid-owner mailpit -d 127.0.0.0/8 -j DROP

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeSSRF

  • Vendor/TechMailpit

  • SeverityMEDIUM

  • CVSS Score5.8

  • EPSS Probability0.03%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-918
  • Technical References
  • GitHub Commit Details

  • GitHub Release v1.28.3

  • GitHub Security Advisory GHSA-6jxm-fv7w-rw5j
  • Related CVEs
  • CVE-2026-27808: Mailpit Link Check API SSRF Vulnerability

  • CVE-2026-21859: Mailpit Email Testing Tool SSRF Vulnerability

  • CVE-2026-23829: Mailpit SMTP Header Injection Vulnerability

  • CVE-2026-22689: Mailpit WebSocket Hijacking Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English