VMware vCenter Server 7.0.x < 7.0 U3w / 8.0.x < 8.0 U3g SMTP Header Injection (VMSA-2025-0016)

high Nessus Plugin ID 266405

Synopsis

The VMware vCenter Server is affected by a DoS vulnerability.

Description

The version of VMware vCenter Server installed on the remote host is 7.0.x prior to 7.0 U3w, or 8.0.x prior to 8.0 U3g. It is, therefore, affected by a vulnerability as referenced in the VMSA-2025-0016 advisory:

- VMware vCenter contains an SMTP header injection vulnerability. A malicious actor with non-administrative privileges on vCenter who has permission to create scheduled tasks may be able to manipulate the notification emails sent for scheduled tasks.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to vCenter Server 7.0 U3w, 8.0 U3g or later.

See Also

http://www.nessus.org/u?b6adfef6

Plugin Details

Severity: High

ID: 266405

File Name: vmware_vcenter_server_VMSA-2025-0016.nasl

Version: 1.1

Type: remote

Family: Misc.

Published: 10/2/2025

Updated: 10/2/2025

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:C/A:P

CVSS Score Source: CVE-2025-41250

CVSS v3

Risk Factor: High

Base Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:L

Vulnerability Information

CPE: cpe:/a:vmware:vcenter_server

Required KB Items: installed_sw/VMware vCenter Server

Patch Publication Date: 9/29/2025

Vulnerability Publication Date: 9/29/2025

Reference Information

CVE: CVE-2025-41250

VMSA: 2025-0016