CVE-2026-27492
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to accidentally receive email content or recipient addresses intended for someone else if the same client instance is reused for sending multiple emails. It mainly affects applications that send emails in sequence, like password resets or notifications, and can be exploited if the application does not properly reset email properties between sends.
Technical Description
Lettermint Node.js SDK is the official Node.js SDK for Lettermint. In versions 1.5.0 and below, email properties (such as to, subject, html, text, and attachments) are not reset between sends when a single client instance is reused across multiple .send() calls. This can cause properties from a previous send to leak into a subsequent one, potentially delivering content or recipient addresses to unintended parties. Applications sending emails to different recipients in sequence — such as transactional flows like password resets or notifications — are affected. This issue has been fixed in version 1.5.1.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 21, 2026
about 2 months ago
Last Modified
Feb 24, 2026
about 1 month ago
Vendor
lettermint
Product
lettermint