CVE-2026-39971

Serendipity is a PHP-powered weblog engine. In versions 2.6-beta2 and below, the email sending functionality in include/functions.inc.php inserts $_SERVER['HTTP_HOST'] directly into the Message-ID SMTP header without validation, and the existing sanitization function serendipity_isResponseClean() is not called on HTTP_HOST before embedding it. An attacker who can control the Host header during an email-triggering action such as comment notifications or subscription emails can inject arbitrary SMTP headers into outgoing emails. This enables identity spoofing, reply hijacking via manipulated Message-ID threading, and email reputation abuse through the attacker's domain being embedded in legitimate mail headers. This issue has been fixed in version 2.6.0.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:s9y:serendipity:*:*:*:*:*:*:*:*
cpe:2.3:a:s9y:serendipity:2.6.0:beta1:*:*:*:*:*:*

History

23 Apr 2026, 13:59

Type Values Removed Values Added
CPE cpe:2.3:a:s9y:serendipity:*:*:*:*:*:*:*:*
cpe:2.3:a:s9y:serendipity:2.6.0:beta1:*:*:*:*:*:*
References () https://github.com/s9y/Serendipity/releases/tag/2.6.0 - () https://github.com/s9y/Serendipity/releases/tag/2.6.0 - Patch
References () https://github.com/s9y/Serendipity/security/advisories/GHSA-458g-q4fh-mj6r - () https://github.com/s9y/Serendipity/security/advisories/GHSA-458g-q4fh-mj6r - Exploit, Vendor Advisory, Mitigation
First Time S9y serendipity
S9y

15 Apr 2026, 04:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-15 04:17

Updated : 2026-04-23 13:59


NVD link : CVE-2026-39971

Mitre link : CVE-2026-39971

CVE.ORG link : CVE-2026-39971


JSON object : View

Products Affected

s9y

  • serendipity
CWE
CWE-113

Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')