Description
SEPPmail Secure Email Gateway before version 15.0.1 insufficiently neutralizes the PDF encryption password, allowing OS command execution.
Published: 2026-03-04
Score: 9.5 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

SEPPmail Secure Email Gateway versions prior to 15.0.1 fail to properly neutralize PDF encryption passwords, allowing an attacker to inject operating‑system commands into the password field. This flaw is classified as CWE‑78, a command injection weakness, and could enable an attacker to execute arbitrary commands on the host that runs the gateway service.

Affected Systems

The vulnerability affects SEPPmail Secure Email Gateway installations running any version earlier than 15.0.1. No other SEPPmail products are listed as impacted.

Risk and Exploitability

The CVSS score of 9.5 indicates a severe vulnerability, while an EPSS score of fewer than 1% suggests that, so far, exploitation has been unlikely or not observed. The flaw is not listed in CISA’s KEV catalog. Although the description does not state the attack surface, the likely vector is remote: an attacker can deliver a specially crafted PDF attachment via email that the gateway processes, triggering the command injection. Because the gateway often operates with elevated privileges, successful exploitation could allow full compromise of the underlying system.

Generated by OpenCVE AI on April 17, 2026 at 13:12 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to SEPPmail Secure Email Gateway version 15.0.1 or later to eliminate the command injection flaw.
  • If an upgrade cannot be performed immediately, disable PDF attachment processing or isolate the gateway in a sandboxed environment to limit exposure.
  • Apply email filtering rules that block or quarantine suspicious PDF attachments before they reach the gateway service.

Generated by OpenCVE AI on April 17, 2026 at 13:12 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 05 Mar 2026 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Seppmail seppmail
CPEs cpe:2.3:a:seppmail:seppmail:*:*:*:*:*:*:*:*
Vendors & Products Seppmail seppmail
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 04 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 04 Mar 2026 09:15:00 +0000

Type Values Removed Values Added
Description SEPPmail Secure Email Gateway before version 15.0.1 insufficiently neutralizes the PDF encryption password, allowing OS command execution.
Title PDF Password CMDi
First Time appeared Seppmail
Seppmail seppmail Secure Email Gateway
Weaknesses CWE-78
CPEs cpe:2.3:a:seppmail:seppmail_secure_email_gateway:*:*:*:*:*:*:*:*
Vendors & Products Seppmail
Seppmail seppmail Secure Email Gateway
References
Metrics cvssV4_0

{'score': 9.5, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:L'}


Subscriptions

Seppmail Seppmail Seppmail Secure Email Gateway
cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC.ch

Published:

Updated: 2026-03-04T16:12:24.028Z

Reserved: 2026-02-19T13:56:28.868Z

Link: CVE-2026-27441

cve-icon Vulnrichment

Updated: 2026-03-04T16:12:07.446Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-04T09:15:55.943

Modified: 2026-03-05T15:46:02.560

Link: CVE-2026-27441

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T13:15:19Z

Weaknesses