CVE-2026-29135

| EUVD-2026-18150 MEDIUM
2026-04-02 NCSC.ch
5.3
CVSS 4.0
Share

CVSS Vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
P
Scope
X

Lifecycle Timeline

3
EUVD ID Assigned
Apr 02, 2026 - 08:45 euvd
EUVD-2026-18150
Analysis Generated
Apr 02, 2026 - 08:45 vuln.today
CVE Published
Apr 02, 2026 - 08:31 nvd
MEDIUM 5.3

Description

SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker to craft a password-tag that bypasses subject sanitization.

Analysis

SEPPmail Secure Email Gateway before version 15.0.3 permits attackers to craft malicious password-tags that circumvent subject line sanitization controls, potentially enabling unauthorized email manipulation or information disclosure. The vulnerability affects all versions prior to 15.0.3 and was reported by NCSC.ch; no CVSS score or public exploit code has been published at the time of analysis.

Sign in for full analysis, threat intelligence, and remediation guidance.

Priority Score

27
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +26
POC: 0

Share

CVE-2026-29135 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy