AspEmail 5.6.0.2 contains a binary permission vulnerability that allows local users to escalate privileges through the Persits Software EmailAgent service. Attackers can exploit full write permissions in the BIN directory to replace the service executable and gain elevated system access.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 19 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 19 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Description AspEmail 5.6.0.2 contains a binary permission vulnerability that allows local users to escalate privileges through the Persits Software EmailAgent service. Attackers can exploit full write permissions in the BIN directory to replace the service executable and gain elevated system access.
Title AspEmail 5.6.0.2 Local Privilege Escalation via Binary Permission Vulnerability
Weaknesses CWE-732
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-12-19T21:52:30.727Z

Reserved: 2025-12-16T19:22:09.998Z

Link: CVE-2023-53949

cve-icon Vulnrichment

Updated: 2025-12-19T21:52:17.072Z

cve-icon NVD

Status : Received

Published: 2025-12-19T21:15:50.397

Modified: 2025-12-19T21:15:50.397

Link: CVE-2023-53949

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses