SEPPmail through 12.1.17 allows command injection within the Admin Portal. An authenticated attacker is able to execute arbitrary code in the context of the user root.
References
Link | Resource |
---|---|
https://code-white.com/public-vulnerability-list/ | Third Party Advisory |
https://www.seppmail.com/products/ | Product |
Configurations
History
14 May 2025, 18:58
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:seppmail:seppmail:*:*:*:*:*:*:*:* | |
First Time |
Seppmail
Seppmail seppmail |
|
References | () https://code-white.com/public-vulnerability-list/ - Third Party Advisory | |
References | () https://www.seppmail.com/products/ - Product |
29 Apr 2025, 13:52
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
28 Apr 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-28 16:15
Updated : 2025-05-14 18:58
NVD link : CVE-2022-41871
Mitre link : CVE-2022-41871
CVE.ORG link : CVE-2022-41871
JSON object : View
Products Affected
seppmail
- seppmail
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')