CVE-2026-32851
Received Received - Intake
Reflected XSS in MailEnable Webmail Allows Remote Code Execution

Publication date: 2026-03-23

Last updated on: 2026-03-30

Assigner: VulnCheck

Description
MailEnable versions prior toΒ 10.55 contain a reflected cross-site scripting vulnerability in the webmail interface that allows remote attackers to execute arbitrary JavaScript in a victim's browser by crafting a malicious URL. Attackers can inject malicious code through the Attendees parameter in the FreeBusy.aspx form, which is not properly sanitized before being embedded into dynamically generated JavaScript.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-23
Last Modified
2026-03-30
Generated
2026-05-07
AI Q&A
2026-03-23
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
mailenable mailenable to 10.55 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': "CVE-2026-32851 is a reflected cross-site scripting (XSS) vulnerability found in MailEnable versions prior to 10.55. It occurs in the webmail interface, specifically through the Attendees parameter in the FreeBusy.aspx page. This parameter is not properly sanitized before being embedded into dynamically generated JavaScript, which allows remote attackers to craft a malicious URL that injects and executes arbitrary JavaScript code in a victim's browser."}] [1]


How can this vulnerability impact me? :

This vulnerability allows remote attackers to execute arbitrary JavaScript code in the browsers of users who click on a maliciously crafted URL. While it requires user interaction, it can lead to attacks such as session hijacking, defacement, or redirection to malicious sites. However, according to the CVSS score, it does not impact confidentiality, integrity, or availability directly, and its overall severity is considered low.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by testing the webmail interface of MailEnable versions prior to 10.55 for reflected cross-site scripting (XSS) via the Attendees parameter in the FreeBusy.aspx page.'}, {'type': 'paragraph', 'content': 'A common approach is to craft a malicious URL that injects JavaScript code into the Attendees parameter and observe if the code is executed in the browser, indicating the presence of the vulnerability.'}, {'type': 'paragraph', 'content': 'For example, you can use curl or a browser to send a request with a payload in the Attendees parameter and check the response or behavior:'}, {'type': 'list_item', 'content': 'curl -v "http://[target]/FreeBusy.aspx?Attendees=<script>alert(\'XSS\')</script>"'}, {'type': 'list_item', 'content': "Use a browser to visit a URL like: http://[target]/FreeBusy.aspx?Attendees=<script>alert('XSS')</script> and observe if an alert box appears."}, {'type': 'paragraph', 'content': 'If the JavaScript executes, it confirms the vulnerability.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade MailEnable to version 10.55 or later, where this vulnerability has been addressed.

Until the upgrade can be performed, consider implementing web application firewall (WAF) rules to block or sanitize requests containing suspicious scripts in the Attendees parameter.

Additionally, educate users to avoid clicking on suspicious links that may exploit this vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart