Project Subscriptions
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-49pc-8936-wvfp | Lettermint Node.js SDK leaks email properties to unintended recipients when client instance is reused |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 24 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lettermint lettermint
|
|
| CPEs | cpe:2.3:a:lettermint:lettermint:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Lettermint lettermint
|
Mon, 23 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lettermint
Lettermint lettermint-node |
|
| Vendors & Products |
Lettermint
Lettermint lettermint-node |
Sat, 21 Feb 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Lettermint Node.js SDK is the official Node.js SDK for Lettermint. In versions 1.5.0 and below, email properties (such as to, subject, html, text, and attachments) are not reset between sends when a single client instance is reused across multiple .send() calls. This can cause properties from a previous send to leak into a subsequent one, potentially delivering content or recipient addresses to unintended parties. Applications sending emails to different recipients in sequence — such as transactional flows like password resets or notifications — are affected. This issue has been fixed in version 1.5.1. | |
| Title | Lettermint Node.js SDK leaks email properties to unintended recipients when client instance is reused | |
| Weaknesses | CWE-488 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-24T18:08:44.011Z
Reserved: 2026-02-19T19:46:03.541Z
Link: CVE-2026-27492
Updated: 2026-02-24T18:08:36.104Z
Status : Analyzed
Published: 2026-02-21T11:15:57.287
Modified: 2026-02-24T15:00:44.600
Link: CVE-2026-27492
No data.
OpenCVE Enrichment
Updated: 2026-02-23T14:32:00Z
Github GHSA