Description
GFI MailEssentials AI versions prior to 22.4 contain a stored cross-site scripting vulnerability in the Advanced Content Filtering rule creation workflow. An authenticated user can supply HTML/JavaScript in the ctl00$ContentPlaceHolder1$pv1$txtRuleName parameter to /MailEssentials/pages/MailSecurity/advancedfiltering.aspx, which is stored and later rendered in the management interface, allowing script execution in the context of a logged-in user.
Published: 2026-02-19
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting in the Advanced Content Filtering rule creation workflow
Action: Apply Patch
AI Analysis

Impact

The vulnerability is a stored cross‑site scripting flaw in the Advanced Content Filtering rule creation workflow of GFI MailEssentials AI. An attacker who is authenticated can inject arbitrary HTML or JavaScript via the ctl00$ContentPlaceHolder1$pv1$txtRuleName parameter on the advancedfiltering.aspx page. The payload is stored and later rendered in the management interface, which enables script execution in the context of any logged‑in user. This can lead to session hijacking, defacement, or the execution of malicious commands within the user's browser session.

Affected Systems

GFI Software: MailEssentials AI is affected. All versions prior to 22.4 contain the flaw. No further sub‑versions are listed as impacted.

Risk and Exploitability

The CVSS score of 5.1 indicates moderate severity, while the EPSS score of less than 1% suggests a very low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Only authenticated users who can create or modify advanced content filtering rules can exploit it; it does not require unauthenticated access or remote code execution. An attacker would need to supply malicious content to the rule‑name field, which is then stored and displayed inside the management console, allowing the injected script to run in the logged‑in user's browser context. No public exploits have been reported, and the limited attack surface reduces the overall risk but it remains important to mitigate.

Generated by OpenCVE AI on April 16, 2026 at 16:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade GFI MailEssentials AI to version 22.4 or later
  • If an immediate upgrade is not possible, restrict or disable the Advanced Content Filtering rule creation capability for users without administrative privileges
  • Ensure that only trusted personnel have permission to add or modify content filter rules and audit existing rules for malicious payloads

Generated by OpenCVE AI on April 16, 2026 at 16:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 21 Feb 2026 11:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Feb 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Gfi mailessentials
CPEs cpe:2.3:a:gfi:mailessentials:*:*:*:*:*:*:*:*
Vendors & Products Gfi mailessentials

Fri, 20 Feb 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Gfi
Gfi mailessentials Ai
Vendors & Products Gfi
Gfi mailessentials Ai

Thu, 19 Feb 2026 20:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


Thu, 19 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Description GFI MailEssentials AI versions prior to 22.4 contain a stored cross-site scripting vulnerability in the Advanced Content Filtering rule creation workflow. An authenticated user can supply HTML/JavaScript in the ctl00$ContentPlaceHolder1$pv1$txtRuleName parameter to /MailEssentials/pages/MailSecurity/advancedfiltering.aspx, which is stored and later rendered in the management interface, allowing script execution in the context of a logged-in user.
Title GFI MailEssentials AI < 22.4 Advanced Content Filtering Rule Stored XSS
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Gfi Mailessentials Mailessentials Ai
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-02T16:46:22.944Z

Reserved: 2026-01-14T16:02:29.334Z

Link: CVE-2026-23606

cve-icon Vulnrichment

Updated: 2026-02-20T20:24:24.745Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-19T18:24:54.760

Modified: 2026-02-20T17:30:27.303

Link: CVE-2026-23606

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T17:00:09Z

Weaknesses