Impact
HSC MailInspector 5.3.3-7 contains a path traversal flaw on the /tap/dw.php endpoint. The text parameter is concatenated into file paths without proper normalization, allowing a remote attacker to read any file on the underlying operating system. This can lead to exposure of credentials, configuration files, and other confidential data.
Affected Systems
The vulnerability affects HSC MailInspector version 5.3.3-7, a mail inspection platform used in various organizations.
Risk and Exploitability
The flaw can be exploited remotely via HTTP by sending crafted requests to the text parameter. No EPSS score is available and the vulnerability is not listed in CISA KEV, yet the potential for complete confidentiality compromise elevates the risk assessment. The likely attack vector involves submitting unauthorized file paths through an unauthenticated endpoint to read arbitrary files.
OpenCVE Enrichment