Seppmail

9 CVEs product

Monthly

CVE-2026-2743 CRITICAL Act Now

Path traversal to RCE in SeppMail web interface via large file transfer. EPSS 0.52%.

RCE Path Traversal Seppmail
NVD
CVSS 3.1
9.8
EPSS
0.5%
CVE-2026-2748 MEDIUM This Month

SEPPmail Secure Email Gateway versions before 15.0.1 fail to properly validate S/MIME certificates with whitespace characters in email addresses, enabling attackers to forge digital signatures and impersonate legitimate senders. This integrity bypass affects organizations relying on SEPPmail for secure email validation and could undermine trust in digitally signed communications. No patch is currently available for affected installations.

Authentication Bypass Seppmail
NVD
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-2747 HIGH This Week

SEPPmail Secure Email Gateway versions prior to 15.0.1 fail to properly isolate decrypted PGP message content from surrounding plaintext, enabling attackers to access encrypted sensitive information over the network without authentication. This high-severity flaw affects organizations relying on SEPPmail for secure email handling and exposes confidential data despite encryption protections. No patch is currently available for this vulnerability.

Information Disclosure Seppmail
NVD
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-2746 MEDIUM This Month

Seppmail versions up to 15.0.1 is affected by improper verification of cryptographic signature (CVSS 5.3).

Information Disclosure Seppmail
NVD
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-27445 MEDIUM This Month

Seppmail versions up to 15.0.1 is affected by improper verification of cryptographic signature (CVSS 5.3).

Information Disclosure Seppmail
NVD
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-27444 HIGH This Week

SEPPmail Secure Email Gateway versions before 15.0.1 misinterpret email addresses in message headers, enabling attackers to spoof sender identities or decrypt encrypted communications due to inconsistent header parsing with standard mail infrastructure. This unauthenticated network-based vulnerability affects all default installations with no available patch, presenting significant risk to organizations relying on the gateway for email security.

Information Disclosure Seppmail
NVD
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-27443 HIGH This Week

SEPPmail Secure Email Gateway versions before 15.0.1 fail to properly validate S/MIME message headers, enabling attackers to forge or manipulate email headers and bypass trust mechanisms without authentication. This allows adversaries to spoof trusted senders or inject malicious headers into encrypted messages, potentially facilitating phishing and social engineering attacks. No patch is currently available for affected installations.

Code Injection Seppmail
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-27442 HIGH This Week

Improper filename validation in SEPPmail Secure Email Gateway's GINA web interface (versions before 15.0.1) enables unauthenticated remote attackers to access arbitrary files on the gateway through specially crafted encrypted email attachments. This path traversal vulnerability affects the confidentiality of sensitive data stored on affected systems. No patch is currently available.

Path Traversal Seppmail
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-27441 CRITICAL Act Now

Command injection in SEPPmail Secure Email Gateway before 15.0.1 via PDF encryption password.

Command Injection Seppmail
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2743
EPSS 1% CVSS 9.8
CRITICAL Act Now

Path traversal to RCE in SeppMail web interface via large file transfer. EPSS 0.52%.

RCE Path Traversal Seppmail
NVD
CVE-2026-2748
EPSS 0% CVSS 5.3
MEDIUM This Month

SEPPmail Secure Email Gateway versions before 15.0.1 fail to properly validate S/MIME certificates with whitespace characters in email addresses, enabling attackers to forge digital signatures and impersonate legitimate senders. This integrity bypass affects organizations relying on SEPPmail for secure email validation and could undermine trust in digitally signed communications. No patch is currently available for affected installations.

Authentication Bypass Seppmail
NVD
CVE-2026-2747
EPSS 0% CVSS 7.5
HIGH This Week

SEPPmail Secure Email Gateway versions prior to 15.0.1 fail to properly isolate decrypted PGP message content from surrounding plaintext, enabling attackers to access encrypted sensitive information over the network without authentication. This high-severity flaw affects organizations relying on SEPPmail for secure email handling and exposes confidential data despite encryption protections. No patch is currently available for this vulnerability.

Information Disclosure Seppmail
NVD
CVE-2026-2746
EPSS 0% CVSS 5.3
MEDIUM This Month

Seppmail versions up to 15.0.1 is affected by improper verification of cryptographic signature (CVSS 5.3).

Information Disclosure Seppmail
NVD
CVE-2026-27445
EPSS 0% CVSS 5.3
MEDIUM This Month

Seppmail versions up to 15.0.1 is affected by improper verification of cryptographic signature (CVSS 5.3).

Information Disclosure Seppmail
NVD
CVE-2026-27444
EPSS 0% CVSS 7.5
HIGH This Week

SEPPmail Secure Email Gateway versions before 15.0.1 misinterpret email addresses in message headers, enabling attackers to spoof sender identities or decrypt encrypted communications due to inconsistent header parsing with standard mail infrastructure. This unauthenticated network-based vulnerability affects all default installations with no available patch, presenting significant risk to organizations relying on the gateway for email security.

Information Disclosure Seppmail
NVD
CVE-2026-27443
EPSS 0% CVSS 7.5
HIGH This Week

SEPPmail Secure Email Gateway versions before 15.0.1 fail to properly validate S/MIME message headers, enabling attackers to forge or manipulate email headers and bypass trust mechanisms without authentication. This allows adversaries to spoof trusted senders or inject malicious headers into encrypted messages, potentially facilitating phishing and social engineering attacks. No patch is currently available for affected installations.

Code Injection Seppmail
NVD
CVE-2026-27442
EPSS 0% CVSS 7.5
HIGH This Week

Improper filename validation in SEPPmail Secure Email Gateway's GINA web interface (versions before 15.0.1) enables unauthenticated remote attackers to access arbitrary files on the gateway through specially crafted encrypted email attachments. This path traversal vulnerability affects the confidentiality of sensitive data stored on affected systems. No patch is currently available.

Path Traversal Seppmail
NVD
CVE-2026-27441
EPSS 0% CVSS 9.8
CRITICAL Act Now

Command injection in SEPPmail Secure Email Gateway before 15.0.1 via PDF encryption password.

Command Injection Seppmail
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy