When using the attachment interaction functionality, Canary Mail 5.1.40 and below saves documents to a file system without a Mark-of-the-Web tag, which allows attackers to bypass the built-in file protection mechanisms of both Windows OS and third-party software.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 16 Dec 2025 16:00:00 +0000

Type Values Removed Values Added
Description When using the attachment interaction functionality, Canary Mail 5.1.40 and below saves documents to a file system without a Mark-of-the-Web tag, which allows attackers to bypass the built-in file protection mechanisms of both Windows OS and third-party software.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-12-16T15:53:04.481Z

Reserved: 2025-11-18T00:00:00.000Z

Link: CVE-2025-65318

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-16T16:15:59.673

Modified: 2025-12-16T16:15:59.673

Link: CVE-2025-65318

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses

No weakness.