漏洞信息 漏洞标题 Email properties leak to unintended recipients when client instance is reused 漏洞ID GHSA-49pc-8936-wvfp 漏洞描述 Email properties (such as to, subject, html, text, and attachments) are not reset between sends when a single client instance is reused across multiple .send() calls. This can cause properties from a previous send to leak into a subsequent one, potentially delivering content or recipient addresses to unintended parties. Applications sending emails to different recipients in sequence — such as transactional flows like password resets or notifications — are affected. 漏洞严重性 等级: Moderate CVSS v3 base metrics: - Attack vector: Local - Attack complexity: High - Privileges required: Low - User interaction: None - Scope: Unchanged - Confidentiality: High - Integrity: None - Availability: None 影响版本与修复版本 受影响版本: <1.5.1 修复版本: 1.5.1 缓解措施 Yes, the issue has been patched. Users should upgrade to v1.5.1 or later. 权宜之计 If upgrading immediately is not possible, instantiate a new client for each send: 确保在发送之间不携带任何状态。 相关参考 npm package Changelog