CVE-2024-45438
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-21

Last updated on: 2025-11-03

Assigner: MITRE

Description
An issue was discovered in TitanHQ SpamTitan Email Security Gateway 8.00.x before 8.00.101 and 8.01.x before 8.01.14. The file quarantine.php within the SpamTitan interface allows unauthenticated users to trigger account-level actions using a crafted GET request. Notably, when a non-existent email address is provided as part of the email parameter, SpamTitan will automatically create a user record and associate quarantine settings with it - all without requiring authentication.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-21
Last Modified
2025-11-03
Generated
2026-05-07
AI Q&A
2025-08-21
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
titanhq spamtitan 8.01
titanhq spamtitan 8.00
titanhq spamtitan 8.01.14
titanhq spamtitan 8.00.101
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-306 The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in TitanHQ SpamTitan Email Security Gateway versions before 8.00.101 and 8.01.14. It involves the file quarantine.php, which allows unauthenticated users to perform account-level actions by sending a specially crafted GET request. Specifically, if a non-existent email address is provided in the email parameter, the system will automatically create a user record and associate quarantine settings with that email without requiring any authentication.


How can this vulnerability impact me? :

The vulnerability can allow unauthorized users to create user records and manipulate quarantine settings without authentication. This could lead to unauthorized access or manipulation of email quarantine data, potentially disrupting email security policies or enabling further exploitation within the email security gateway.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart