{"id":"CVE-2025-53859","details":"NGINX Open Source and NGINX Plus have a vulnerability in the ngx_mail_smtp_module that might allow an unauthenticated attacker to over-read NGINX SMTP authentication process memory; as a result, the server side may leak arbitrary bytes sent in a request to the authentication server. This issue happens during the NGINX SMTP authentication process and requires the attacker to make preparations against the target system to extract the leaked data. The issue affects NGINX only if (1) it is built with the ngx_mail_smtp_module, (2) the smtp_auth directive is configured with method \"none,\" and (3) the authentication server returns the \"Auth-Wait\" response header.\n\n\n\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated.","aliases":["BIT-nginx-2025-53859","BIT-nginx-gateway-2025-53859"],"modified":"2026-05-08T17:29:13.700147629Z","published":"2025-08-13T15:15:37.657Z","related":["CGA-8pf6-4v4g-766p","SUSE-SU-2025:03089-1","SUSE-SU-2025:03243-1","openSUSE-SU-2025:15449-1"],"references":[{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2025/08/13/5"},{"type":"ADVISORY","url":"https://my.f5.com/manage/s/article/K000152786"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/nginx/nginx","events":[{"introduced":"a3f080c3cf85d9653005a63b5155c8977abc4a1d"},{"fixed":"0024724f2f77ac4fa0d7394e859608d6844a5914"}],"database_specific":{"versions":[{"introduced":"0.7.22"},{"fixed":"1.29.1"}]}}],"versions":["release-0.7.22","release-0.7.23","release-0.7.24","release-0.7.25","release-0.7.26","release-0.7.27","release-0.7.28","release-0.7.29","release-0.7.30","release-0.7.31","release-0.7.32","release-0.7.33","release-0.7.34","release-0.7.35","release-0.7.36","release-0.7.37","release-0.7.38","release-0.7.39","release-0.7.40","release-0.7.41","release-0.7.42","release-0.7.43","release-0.7.44","release-0.7.45","release-0.7.46","release-0.7.47","release-0.7.48","release-0.7.49","release-0.7.50","release-0.7.51","release-0.7.52","release-0.7.53","release-0.7.54","release-0.7.55","release-0.7.56","release-0.7.57","release-0.7.58","release-0.7.59","release-0.8.0","release-0.8.1","release-0.8.10","release-0.8.11","release-0.8.12","release-0.8.13","release-0.8.14","release-0.8.15","release-0.8.16","release-0.8.17","release-0.8.18","release-0.8.19","release-0.8.2","release-0.8.20","release-0.8.21","release-0.8.22","release-0.8.23","release-0.8.24","release-0.8.25","release-0.8.26","release-0.8.27","release-0.8.28","release-0.8.29","release-0.8.3","release-0.8.30","release-0.8.31","release-0.8.32","release-0.8.33","release-0.8.34","release-0.8.35","release-0.8.36","release-0.8.37","release-0.8.38","release-0.8.39","release-0.8.4","release-0.8.40","release-0.8.41","release-0.8.42","release-0.8.43","release-0.8.44","release-0.8.45","release-0.8.46","release-0.8.47","release-0.8.48","release-0.8.49","release-0.8.5","release-0.8.50","release-0.8.51","release-0.8.52","release-0.8.53","release-0.8.6","release-0.8.7","release-0.8.8","release-0.8.9","release-0.9.0","release-0.9.1","release-0.9.2","release-0.9.3","release-0.9.4","release-0.9.5","release-0.9.6","release-0.9.7","release-1.0.0","release-1.0.1","release-1.0.2","release-1.0.3","release-1.0.4","release-1.0.5","release-1.1.0","release-1.1.1","release-1.1.10","release-1.1.11","release-1.1.12","release-1.1.13","release-1.1.14","release-1.1.15","release-1.1.16","release-1.1.17","release-1.1.18","release-1.1.19","release-1.1.2","release-1.1.3","release-1.1.4","release-1.1.5","release-1.1.6","release-1.1.7","release-1.1.8","release-1.1.9","release-1.11.0","release-1.11.1","release-1.11.10","release-1.11.11","release-1.11.12","release-1.11.13","release-1.11.2","release-1.11.3","release-1.11.4","release-1.11.5","release-1.11.6","release-1.11.7","release-1.11.8","release-1.11.9","release-1.13.0","release-1.13.1","release-1.13.10","release-1.13.11","release-1.13.12","release-1.13.2","release-1.13.3","release-1.13.4","release-1.13.5","release-1.13.6","release-1.13.7","release-1.13.8","release-1.13.9","release-1.15.0","release-1.15.1","release-1.15.10","release-1.15.11","release-1.15.12","release-1.15.2","release-1.15.3","release-1.15.4","release-1.15.5","release-1.15.6","release-1.15.7","release-1.15.8","release-1.15.9","release-1.17.0","release-1.17.1","release-1.17.10","release-1.17.2","release-1.17.3","release-1.17.4","release-1.17.5","release-1.17.6","release-1.17.7","release-1.17.8","release-1.17.9","release-1.19.0","release-1.19.1","release-1.19.10","release-1.19.2","release-1.19.3","release-1.19.4","release-1.19.5","release-1.19.6","release-1.19.7","release-1.19.8","release-1.19.9","release-1.2.0","release-1.21.0","release-1.21.1","release-1.21.2","release-1.21.3","release-1.21.4","release-1.21.5","release-1.21.6","release-1.23.0","release-1.23.1","release-1.23.2","release-1.23.3","release-1.23.4","release-1.25.0","release-1.25.1","release-1.25.2","release-1.25.3","release-1.25.4","release-1.25.5","release-1.27.0","release-1.27.1","release-1.27.2","release-1.27.3","release-1.27.4","release-1.27.5","release-1.29.0","release-1.3.0","release-1.3.1","release-1.3.10","release-1.3.11","release-1.3.12","release-1.3.13","release-1.3.14","release-1.3.15","release-1.3.16","release-1.3.2","release-1.3.3","release-1.3.4","release-1.3.5","release-1.3.6","release-1.3.7","release-1.3.8","release-1.3.9","release-1.4.0","release-1.5.0","release-1.5.1","release-1.5.10","release-1.5.11","release-1.5.12","release-1.5.13","release-1.5.2","release-1.5.3","release-1.5.4","release-1.5.5","release-1.5.6","release-1.5.7","release-1.5.8","release-1.5.9","release-1.7.0","release-1.7.1","release-1.7.10","release-1.7.11","release-1.7.12","release-1.7.2","release-1.7.3","release-1.7.4","release-1.7.5","release-1.7.6","release-1.7.7","release-1.7.8","release-1.7.9","release-1.9.0","release-1.9.1","release-1.9.10","release-1.9.11","release-1.9.12","release-1.9.13","release-1.9.14","release-1.9.15","release-1.9.2","release-1.9.3","release-1.9.4","release-1.9.5","release-1.9.6","release-1.9.7","release-1.9.8","release-1.9.9"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"r30-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"r31-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"r32-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"r32-p1"}]},{"events":[{"introduced":"0"},{"last_affected":"r32-p2"}]},{"events":[{"introduced":"0"},{"last_affected":"r33-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"r33-p1"}]},{"events":[{"introduced":"0"},{"last_affected":"r33-p2"}]},{"events":[{"introduced":"0"},{"last_affected":"r34-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"r34-p1"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-53859.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"}]}