CVE-2026-28753
Severity CVSS v4.0:
MEDIUM
Type:
CWE-93
Improper Neutralization of CRLF Sequences ('CRLF Injection')
Publication date:
24/03/2026
Last modified:
26/03/2026
Description
NGINX Plus and NGINX Open Source have a vulnerability in the ngx_mail_smtp_module module due to the improper handling of CRLF sequences in DNS responses. This allows an attacker-controlled DNS server to inject arbitrary headers into SMTP upstream requests, leading to potential request manipulation. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Impact
Base Score 4.0
6.30
Severity 4.0
MEDIUM
Base Score 3.x
3.70
Severity 3.x
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:f5:nginx_plus:r32:p1:*:*:*:*:*:* | ||
| cpe:2.3:a:f5:nginx_plus:r32:p2:*:*:*:*:*:* | ||
| cpe:2.3:a:f5:nginx_plus:r32:p3:*:*:*:*:*:* | ||
| cpe:2.3:a:f5:nginx_plus:r32:p4:*:*:*:*:*:* | ||
| cpe:2.3:a:f5:nginx_plus:r33:*:*:*:*:*:*:* | ||
| cpe:2.3:a:f5:nginx_plus:r33:p1:*:*:*:*:*:* | ||
| cpe:2.3:a:f5:nginx_plus:r33:p2:*:*:*:*:*:* | ||
| cpe:2.3:a:f5:nginx_plus:r33:p3:*:*:*:*:*:* | ||
| cpe:2.3:a:f5:nginx_plus:r34:*:*:*:*:*:*:* | ||
| cpe:2.3:a:f5:nginx_plus:r34:p1:*:*:*:*:*:* | ||
| cpe:2.3:a:f5:nginx_plus:r34:p2:*:*:*:*:*:* | ||
| cpe:2.3:a:f5:nginx_plus:r35:*:*:*:*:*:*:* | ||
| cpe:2.3:a:f5:nginx_plus:r35:p1:*:*:*:*:*:* | ||
| cpe:2.3:a:f5:nginx_plus:r36:*:*:*:*:*:*:* | ||
| cpe:2.3:a:f5:nginx_plus:r36:p1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



