Description
GFI MailEssentials AI versions prior to 22.4 contain a stored cross-site scripting vulnerability in the Sender Policy Framework Email Exceptions interface. An authenticated user can supply HTML/JavaScript in the ctl00$ContentPlaceHolder1$pv4$txtEmailDescription parameter to /MailEssentials/pages/MailSecurity/SenderPolicyFramework.aspx, which is stored and later rendered in the management interface, allowing script execution in the context of a logged-in user.
Published: 2026-02-19
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored cross‑site scripting that can execute arbitrary script in the logged‑in user’s browser
Action: Update
AI Analysis

Impact

The vulnerability exists in the Sender Policy Framework Email Exceptions feature of GFI MailEssentials AI. An authenticated administrator can submit HTML or JavaScript via the ctl00$ContentPlaceHolder1$pv4$txtEmailDescription field to the /MailEssentials/pages/MailSecurity/SenderPolicyFramework.aspx page. The input is stored without sanitization and later rendered in the management interface, enabling script execution within the user’s browser session. This allows an attacker to run arbitrary code, trick users into executing malicious actions, or steal session information.

Affected Systems

All installations of GFI MailEssentials AI with a version older than 22.4 are affected, including any deployment that uses the Sender Policy Framework Email Exceptions interface.

Risk and Exploitability

The CVSS score of 5.1 indicates moderate impact, and the EPSS score of less than 1% shows a very low probability of exploitation observed at the time of analysis. The flaw is not currently listed in the CISA KEV catalog. Because the vulnerability requires authenticated access, an attacker must first compromise user credentials or infiltrate the administration console. If successful, the stored script persists until the exception entry is edited or deleted, enabling persistent cross‑site scripting for the duration of the legitimate administrator session.

Generated by OpenCVE AI on April 16, 2026 at 16:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade GFI MailEssentials AI to version 22.4 or later to apply the vendor patch that removes the vulnerability.
  • If an upgrade is not immediately possible, restrict write access to the Sender Policy Framework Email Exceptions page to only essential administrators and monitor the ctl00$ContentPlaceHolder1$pv4$txtEmailDescription input for unexpected HTML or JavaScript content.
  • Use an input filter or sanitization library on server side for the txtEmailDescription field to escape any HTML characters before storage.

Generated by OpenCVE AI on April 16, 2026 at 16:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 21 Feb 2026 00:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Feb 2026 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Gfi mailessentials
CPEs cpe:2.3:a:gfi:mailessentials:*:*:*:*:*:*:*:*
Vendors & Products Gfi mailessentials

Fri, 20 Feb 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Gfi
Gfi mailessentials Ai
Vendors & Products Gfi
Gfi mailessentials Ai

Thu, 19 Feb 2026 20:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


Thu, 19 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Description GFI MailEssentials AI versions prior to 22.4 contain a stored cross-site scripting vulnerability in the Sender Policy Framework Email Exceptions interface. An authenticated user can supply HTML/JavaScript in the ctl00$ContentPlaceHolder1$pv4$txtEmailDescription parameter to /MailEssentials/pages/MailSecurity/SenderPolicyFramework.aspx, which is stored and later rendered in the management interface, allowing script execution in the context of a logged-in user.
Title GFI MailEssentials AI < 22.4 Anti-Spam Sender Policy Framework Email Exceptions Description Stored XSS
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Gfi Mailessentials Mailessentials Ai
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-02T16:46:30.180Z

Reserved: 2026-01-14T16:02:29.335Z

Link: CVE-2026-23615

cve-icon Vulnrichment

Updated: 2026-02-20T20:23:07.193Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-19T18:24:56.960

Modified: 2026-02-20T17:29:05.300

Link: CVE-2026-23615

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T17:00:09Z

Weaknesses