-
CVSS Score
-The vulnerability stems from how email.utils.parseaddr was used in sendEmail to process email addresses. The commit 4e1cfff explicitly fixes this by adding checks to ensure parsed addresses match raw input and using the original address in sendmail. The CVE description and patch both confirm the issue was in emailutils.py's handling of parseaddr results, making sendEmail the clear vulnerable function.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| matrix-sydent | pip | < 1.0.2 | 1.0.2 |