Description
SEPPmail Secure Email Gateway before version 15.0.1 does not properly sanitize the headers from S/MIME protected MIME entities, allowing an attacker to control trusted headers.
Published: 2026-03-04
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Manipulation of trusted headers in S/MIME processing enabling spoofing or bypass of security controls
Action: Apply Upgrade
AI Analysis

Impact

SEPPmail Secure Email Gateway versions before 15.0.1 fail to sanitize headers extracted from S/MIME protected MIME entities. The flaw, a classic input validation issue identified as CWE‑20, allows an attacker to inject or alter trusted email headers. If successful, the gateway may process emails with forged metadata, potentially enabling spoofed sender addresses, bypassing authentication checks, or influencing subsequent mail handling, thereby compromising email integrity and possibly confidentiality.

Affected Systems

Affected systems include all SEPPmail Secure Email Gateway deployments running a version earlier than 15.0.1. The vulnerability applies to the secure email gateway product released by SEPPmail, as documented by the vendor in their advisory.

Risk and Exploitability

The CVSS score of 8.2 indicates high severity, but the EPSS score of less than 1 % suggests a low likelihood of exploitation. The flaw is not listed in the CISA KEV catalog, implying no publicly known widespread attacks. Despite the low probability, the most plausible attack vector is remote, via an attacker sending a crafted S/MIME encrypted message to the gateway that exploits the header sanitization failure. Successful exploitation would allow the attacker to control headers that the gateway treats as trusted, creating a risk of email spoofing or bypassing security controls.

Generated by OpenCVE AI on April 16, 2026 at 13:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade SEPPmail Secure Email Gateway to version 15.0.1 or later
  • Disable or restrict S/MIME processing for untrusted senders until a patch is applied
  • Monitor email logs for entries containing unexpected or forged header values and investigate any anomalies

Generated by OpenCVE AI on April 16, 2026 at 13:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 05 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Seppmail seppmail
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:seppmail:seppmail:*:*:*:*:*:*:*:*
Vendors & Products Seppmail seppmail
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


Wed, 04 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Mar 2026 09:15:00 +0000

Type Values Removed Values Added
Description SEPPmail Secure Email Gateway before version 15.0.1 does not properly sanitize the headers from S/MIME protected MIME entities, allowing an attacker to control trusted headers.
Title S/MIME Decryption Tag Sanitization Bypass
First Time appeared Seppmail
Seppmail seppmail Secure Email Gateway
Weaknesses CWE-20
CPEs cpe:2.3:a:seppmail:seppmail_secure_email_gateway:*:*:*:*:*:*:*:*
Vendors & Products Seppmail
Seppmail seppmail Secure Email Gateway
References
Metrics cvssV4_0

{'score': 8.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:L/SA:N'}


Subscriptions

Seppmail Seppmail Seppmail Secure Email Gateway
cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC.ch

Published:

Updated: 2026-03-04T19:41:41.356Z

Reserved: 2026-02-19T13:56:28.869Z

Link: CVE-2026-27443

cve-icon Vulnrichment

Updated: 2026-03-04T19:41:34.986Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-04T09:15:56.307

Modified: 2026-03-05T15:41:21.363

Link: CVE-2026-27443

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T13:45:21Z

Weaknesses