Vulnerability Description
Versions of the package directorytree/imapengine before 1.22.3 are vulnerable to Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') via the id() function in ImapConnection.php due to improperly escaping user input before including it in IMAP ID commands. This allows attackers to read or delete victim's emails, terminate the victim's session or execute any valid IMAP command on victim's mailbox by including quote characters " or CRLF sequences \r\n in the input.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://gist.github.com/wanamirulhakim/74b41589cdea3c07c3375e5946960778
- https://github.com/DirectoryTree/ImapEngine/commit/87fca56affd9527e6907a705e6d60
- https://github.com/DirectoryTree/ImapEngine/pull/150
- https://security.snyk.io/vuln/SNYK-PHP-DIRECTORYTREEIMAPENGINE-15274300
FAQ
What is CVE-2026-2469?
CVE-2026-2469 is a vulnerability with a CVSS score of 7.6 (HIGH). Versions of the package directorytree/imapengine before 1.22.3 are vulnerable to Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') via the id() functio...
How severe is CVE-2026-2469?
CVE-2026-2469 has been rated HIGH with a CVSS base score of 7.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-2469?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.