CVE-2025-34408
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mailenable | mailenable | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a reflected cross-site scripting (XSS) issue in MailEnable versions prior to 10.54. It occurs because the 'Added' parameter in the URL /Mondo/lang/sys/Forms/MAI/AddRecipientsResult.aspx is not properly sanitized when processed via a GET request. An attacker can craft a malicious payload that breaks out of the existing HTML markup and injects arbitrary JavaScript code. When a victim visits a malicious link containing this payload, the injected script executes in their browser.
How can this vulnerability impact me? :
Exploitation of this vulnerability can allow an attacker to redirect victims to malicious websites, steal non-HttpOnly cookies, inject arbitrary HTML or CSS, and perform actions on behalf of the authenticated user. This can lead to unauthorized access, data theft, and manipulation of user sessions.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include upgrading MailEnable to version 10.54 or later, where this reflected XSS vulnerability has been fixed. If upgrading is not immediately possible, you should implement web application firewall (WAF) rules to block or sanitize requests containing suspicious scripts in the 'Added' parameter. Additionally, educate users to avoid clicking on suspicious links and consider disabling or restricting access to the vulnerable URL if feasible until a patch is applied. [2, 3]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by testing the 'Added' parameter in the URL /Mondo/lang/sys/Forms/MAI/AddRecipientsResult.aspx for reflected cross-site scripting (XSS). You can use tools like curl or a web browser to send crafted GET requests with XSS payloads in the 'Added' parameter and observe if the payload is reflected unsanitized in the HTTP response. For example, a curl command to test might be: curl -v "http://<target>/Mondo/lang/sys/Forms/MAI/AddRecipientsResult.aspx?Added=<script>alert(1)</script>" and check if the script tag appears in the response body. Additionally, web vulnerability scanners that test for reflected XSS can be used to automate detection. [2]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided resources do not explicitly discuss the impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA. However, since the vulnerability allows theft of non-HttpOnly cookies, redirection to malicious sites, and execution of actions as an authenticated user, it could potentially lead to unauthorized access or data exposure, which may affect compliance with data protection regulations. No direct statements about compliance impact are available in the provided text. [2]