CVE-2025-53859

LOW

NGINX - Info Disclosure

Title source: llm
STIX 2.1

Description

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_mail_smtp_module that might allow an unauthenticated attacker to over-read NGINX SMTP authentication process memory; as a result, the server side may leak arbitrary bytes sent in a request to the authentication server. This issue happens during the NGINX SMTP authentication process and requires the attacker to make preparations against the target system to extract the leaked data. The issue affects NGINX only if (1) it is built with the ngx_mail_smtp_module, (2) the smtp_auth directive is configured with method "none," and (3) the authentication server returns the "Auth-Wait" response header. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

References (2)

Core 2

Scores

CVSS v3 3.7
EPSS 0.0003
EPSS Percentile 7.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-125
Status published
Products (6)
f5/nginx_open_source 0.7.22 - 1.29.1
f5/nginx_plus r30
f5/nginx_plus r31
f5/nginx_plus r32 (3 CPE variants)
f5/nginx_plus r33 (3 CPE variants)
f5/nginx_plus r34 (2 CPE variants)
Published Aug 13, 2025
Tracked Since Feb 18, 2026