CVE-2022-41871

SEPPmail through 12.1.17 allows command injection within the Admin Portal. An authenticated attacker is able to execute arbitrary code in the context of the user root.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:seppmail:seppmail:*:*:*:*:*:*:*:*

History

14 May 2025, 18:58

Type Values Removed Values Added
CPE cpe:2.3:a:seppmail:seppmail:*:*:*:*:*:*:*:*
First Time Seppmail
Seppmail seppmail
References () https://code-white.com/public-vulnerability-list/ - () https://code-white.com/public-vulnerability-list/ - Third Party Advisory
References () https://www.seppmail.com/products/ - () https://www.seppmail.com/products/ - Product

29 Apr 2025, 13:52

Type Values Removed Values Added
Summary
  • (es) SEPPmail, hasta la versión 12.1.17, permite la inyección de comandos en el Portal de Administración. Un atacante autenticado puede ejecutar código arbitrario en el contexto del usuario root.

28 Apr 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-28 16:15

Updated : 2025-05-14 18:58


NVD link : CVE-2022-41871

Mitre link : CVE-2022-41871

CVE.ORG link : CVE-2022-41871


JSON object : View

Products Affected

seppmail

  • seppmail
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')