CVE-2026-29139
Received Received - Intake
Account Takeover via GINA Reset in SEPPmail

Publication date: 2026-04-02

Last updated on: 2026-04-16

Assigner: Switzerland Government Common Vulnerability Program

Description
SEPPmail Secure Email Gateway before version 15.0.3 allows account takeover by abusing GINA account initialization to reset a victim account password.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-02
Last Modified
2026-04-16
Generated
2026-05-07
AI Q&A
2026-04-02
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
seppmail secure_email_gateway to 15.0.3 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-288 The product requires authentication, but the product has an alternate path or channel that does not require authentication.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in SEPPmail Secure Email Gateway versions before 15.0.3. It allows an attacker to take over an account by exploiting the GINA account initialization process to reset the password of a victim's account.


How can this vulnerability impact me? :

The vulnerability can lead to an attacker gaining unauthorized access to user accounts by resetting their passwords. This account takeover can compromise sensitive email communications and potentially allow further malicious activities within the affected system.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart