Description
SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker to bypass subject sanitization and forge tags such as [signed OK].
Published: 2026-04-02
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Subject Tag Forgery via Sanitization Bypass
Action: Immediate Patch
AI Analysis

Impact

SEPPmail Secure Email Gateway versions prior to 15.0.3 contain a bounded input validation flaw that permits attackers to bypass the system's subject sanitization logic and insert specially crafted subject tags such as [signed OK]. Because the gateway accepts and processes subject headers from inbound email, the forged tags can trick recipients into believing messages are authenticated or have been reviewed, potentially enabling phishing, social engineering, or other deceptive email campaigns. The weakness is a classic input validation error classified as CWE‑20 and directly affects email authenticity.

Affected Systems

Affected software is SEPPmail Secure Email Gateway, a secure email filtering and forwarding appliance that processes inbound email traffic. All deployments running a version earlier than 15.0.3 are vulnerable; deployments on 15.0.3 or later have the flaw fixed as noted in the vendor's release notes.

Risk and Exploitability

The CVSS base score of 7.7 indicates a high severity, reflecting the potential for widespread impact on client trust. The EPSS score is not provided, and the issue is not listed in the CISA KEV catalog, suggesting no publicly known exploitation at the time of disclosure. The likely attack vector is remote, via crafted email applicants that bypass subject sanitization when sent to the gateway over the network; no special privileges or insider access appear required. As the flaw permits tampering with email headers that are propagated to end recipients, the risk to confidentiality is low, but the integrity of the email authentication process is compromised, enabling phishing attacks.

Generated by OpenCVE AI on April 2, 2026 at 10:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor patch or upgrade to SEPPmail Secure Email Gateway version 15.0.3 or later

Generated by OpenCVE AI on April 2, 2026 at 10:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 02 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
Description SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker to bypass subject sanitization and forge tags such as [signed OK].
Title Bounded Subject Tag Sanitization
First Time appeared Seppmail
Seppmail seppmail Secure Email Gateway
Weaknesses CWE-20
CPEs cpe:2.3:a:seppmail:seppmail_secure_email_gateway:*:*:*:*:*:*:*:*
Vendors & Products Seppmail
Seppmail seppmail Secure Email Gateway
References
Metrics cvssV4_0

{'score': 7.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:N'}


Subscriptions

Seppmail Seppmail Secure Email Gateway
cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC.ch

Published:

Updated: 2026-04-02T14:40:50.107Z

Reserved: 2026-03-04T09:08:07.342Z

Link: CVE-2026-29141

cve-icon Vulnrichment

Updated: 2026-04-02T14:40:39.987Z

cve-icon NVD

Status : Received

Published: 2026-04-02T09:16:22.793

Modified: 2026-04-02T09:16:22.793

Link: CVE-2026-29141

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:22:06Z

Weaknesses