CVE-2026-34833
Plaintext Password Exposure in Bulwark Webmail API Session Endpoint
Publication date: 2026-04-02
Last updated on: 2026-04-09
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| bulwarkmail | webmail | to 1.4.10 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-312 | The product stores sensitive information in cleartext within a resource that might be accessible to another control sphere. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability exposed users' plaintext passwords in the JSON response of an authentication endpoint, which could lead to unauthorized access to sensitive personal data. This exposure risks non-compliance with data protection standards such as GDPR and HIPAA, which require the protection of personal and sensitive information against unauthorized disclosure.
Specifically, the cleartext storage and transmission of passwords violates principles of data confidentiality and security controls mandated by these regulations. The vulnerability could result in breaches of user credentials through browser logs, local caches, or network proxies, increasing the risk of data breaches and potential regulatory penalties.
The issue was addressed in version 1.4.10 by removing the password from the API response and implementing stricter session credential handling, which helps restore compliance with security requirements of common standards.
Can you explain this vulnerability to me?
CVE-2026-34833 is an information exposure vulnerability in Bulwark Webmail versions prior to 1.4.10. The GET /api/auth/session endpoint returned the user's plaintext password within the JSON response.
This exposed sensitive credentials to browser logs, local caches, and network proxies, potentially allowing unauthorized parties to access user passwords.
The issue was fixed in version 1.4.10 by removing the password from the response and securing session credential handling with additional protections to prevent unauthorized access.
How can this vulnerability impact me? :
This vulnerability can lead to the exposure of user passwords in plaintext through browser logs, local caches, and network proxies.
An attacker who gains access to these exposed credentials could impersonate users, access their email accounts, and potentially compromise sensitive information.
Because the vulnerability allows sensitive data to be leaked without authentication, it poses a high security risk.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring network traffic for JSON responses from the GET /api/auth/session endpoint that include plaintext passwords.
You can use network traffic inspection tools such as curl, tcpdump, or Wireshark to capture and analyze HTTP responses from the Bulwark Webmail server.
- Use curl to send a GET request and inspect the response: curl -i http://<bulwark-webmail-server>/api/auth/session
- Use tcpdump to capture HTTP traffic on port 80 or 443: tcpdump -A -s 0 'tcp port 80 or tcp port 443 and host <bulwark-webmail-server>'
- Use Wireshark to filter HTTP responses containing the /api/auth/session endpoint and check if the JSON response includes a plaintext password field.
Detection involves verifying if the JSON response from the GET /api/auth/session endpoint contains the user's plaintext password, which should not be present in patched versions.
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to upgrade Bulwark Webmail to version 1.4.10 or later, where the issue has been patched.
Version 1.4.10 removes the plaintext password from the GET /api/auth/session response and secures session credential handling by moving it to a PUT handler protected by the Sec-Fetch-Site header.
Until the upgrade is applied, avoid exposing the webmail interface to untrusted networks and monitor for suspicious access or credential leaks.
Additionally, consider invalidating existing sessions and prompting users to change their passwords to reduce the risk of compromised credentials.