Description
Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to 1.4.11, the reverse proxy (proxy.ts) set the Content-Security-Policy-Report-Only header instead of the enforcing Content-Security-Policy header. This means cross-site scripting (XSS) attacks were logged but not blocked. Any user who could inject script content (e.g., via crafted email HTML) could execute arbitrary JavaScript in the context of the application, potentially stealing session tokens or performing actions on behalf of the user. This vulnerability is fixed in 1.4.11.
Published: 2026-04-06
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Client‑side XSS
Action: Apply Patch
AI Analysis

Impact

Bulwark Webmail, a self‑hosted client for Stalwart Mail Server, incorrectly emitted the Content‑Security‑Policy header in Report‑Only mode before version 1.4.11. This configuration let all script payloads in e‑mail HTML pass through the browser unblocked, allowing an attacker who can trick a user into opening a crafted email to run arbitrary JavaScript in that user’s browser session. In effect, the vulnerability provides a client‑side cross‑site scripting (XSS) vector that can steal session tokens, fabricate requests, or otherwise act as the victim. The weakness is a classic injection flaw that falls under CWE‑79.

Affected Systems

Any installation of the Bulwarkmail Webmail platform running a kernel version older than 1.4.11 is vulnerable. The problem originates in the reverse‑proxy module, proxy.ts, and it applies to the entire webmail application irrespective of the mail server configuration.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity for the impact on confidentiality and integrity of user sessions. Because the exploit requires only the delivery of a malicious e‑mail to a target user or the insertion of script into an e‑mail that the user will view, it can be executed remotely via the Webmail interface without additional privileges. EPSS data is not available, and the vulnerability is not listed in CISA’s KEV catalog, suggesting no confirmed exploitation in the wild yet, but the client‑side nature of the flaw means any user could be affected. Administrators should treat this as a risk that can be mitigated immediately through the vendor’s patch.

Generated by OpenCVE AI on April 7, 2026 at 02:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Bulwark Webmail to version 1.4.11 or later.

Generated by OpenCVE AI on April 7, 2026 at 02:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Bulwarkmail
Bulwarkmail webmail
Vendors & Products Bulwarkmail
Bulwarkmail webmail

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to 1.4.11, the reverse proxy (proxy.ts) set the Content-Security-Policy-Report-Only header instead of the enforcing Content-Security-Policy header. This means cross-site scripting (XSS) attacks were logged but not blocked. Any user who could inject script content (e.g., via crafted email HTML) could execute arbitrary JavaScript in the context of the application, potentially stealing session tokens or performing actions on behalf of the user. This vulnerability is fixed in 1.4.11.
Title Content-Security-Policy was set to Report-Only mode, failing to block XSS attacks
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Bulwarkmail Webmail
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-07T19:33:05.084Z

Reserved: 2026-04-02T17:03:42.074Z

Link: CVE-2026-35390

cve-icon Vulnrichment

Updated: 2026-04-07T19:33:00.604Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-04-06T21:16:20.723

Modified: 2026-04-07T20:16:27.963

Link: CVE-2026-35390

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T09:37:14Z

Weaknesses