Apache James IMAP parsing Denial Of Service
Description
In Apache James, while fuzzing with Jazzer the IMAP parsing stack, we discover that crafted APPEND and STATUS IMAP command could be used to trigger infinite loops resulting in expensive CPU computations and OutOfMemory exceptions. This can be used for a Denial Of Service attack. The IMAP user needs to be authenticated to exploit this vulnerability. This affected Apache James prior to version 3.6.1. This vulnerability had been patched in Apache James 3.6.1 and higher. We recommend the upgrade.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Crafted IMAP APPEND and STATUS commands cause infinite loops and resource exhaustion in Apache James before 3.6.1, enabling authenticated DoS attacks.
Vulnerability
In Apache James, while fuzzing with Jazzer the IMAP parsing stack, discover crafted APPEND and STATUS IMAP commands trigger infinite loops, leading to expensive CPU computations and OutOfMemory exceptions. This affects Apache James prior to version 3.6.1 [1][2][3].
Exploitation
An attacker must be authenticated as an IMAP user to exploit this vulnerability. By sending specially crafted APPEND or STATUS commands, the attacker can cause the parsing loop to never terminate [1][2].
Impact
Successful exploitation results in a Denial of Service (DoS) due to resource exhaustion, consuming excessive CPU and memory, potentially causing the mail server to become unresponsive or crash [1][2][3].
Mitigation
This vulnerability has been patched in Apache James version 3.6.1 and later. Users are strongly recommended to upgrade to the latest version. No other workarounds are documented in the available references [1][2][3].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.james:james-serverMaven | < 3.6.1 | 3.6.1 |
Affected products
10- osv-coords9 versionspkg:apk/chainguard/keycloakpkg:apk/chainguard/keycloak-bitnami-compatpkg:apk/chainguard/keycloak-compatpkg:apk/chainguard/keycloak-iamguarded-compatpkg:apk/wolfi/keycloakpkg:apk/wolfi/keycloak-bitnami-compatpkg:apk/wolfi/keycloak-compatpkg:apk/wolfi/keycloak-iamguarded-compatpkg:maven/org.apache.james/james-server
< 0+ 8 more
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 3.6.1
- Apache Software Foundation/Apache Jamesv5Range: Apache James
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-fqgw-6qj5-8hmpghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2021-40111ghsaADVISORY
- www.openwall.com/lists/oss-security/2022/01/04/3ghsamailing-listx_refsource_MLISTWEB
- www.openwall.com/lists/oss-security/2022/01/04/3ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.