CVE-2024-45438
BaseFortify
Publication date: 2025-08-21
Last updated on: 2025-11-03
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| titanhq | spamtitan | 8.01 |
| titanhq | spamtitan | 8.00 |
| titanhq | spamtitan | 8.01.14 |
| titanhq | spamtitan | 8.00.101 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-306 | The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. |
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in TitanHQ SpamTitan Email Security Gateway versions before 8.00.101 and 8.01.14. It involves the file quarantine.php, which allows unauthenticated users to perform account-level actions by sending a specially crafted GET request. Specifically, if a non-existent email address is provided in the email parameter, the system will automatically create a user record and associate quarantine settings with that email without requiring any authentication.
How can this vulnerability impact me? :
The vulnerability can allow unauthorized users to create user records and manipulate quarantine settings without authentication. This could lead to unauthorized access or manipulation of email quarantine data, potentially disrupting email security policies or enabling further exploitation within the email security gateway.