Description
SEPPmail Secure Email Gateway before version 15.0.4 fails to enforce authorization checks for multiple endpoints in the new GINA UI, allowing unauthenticated remote attackers to access functionality that should require a valid session.
Published: 2026-05-08
Score: 9.3 Critical
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

SEPPmail Secure Email Gateway before version 15.0.4 does not enforce authorization checks on several endpoints in the new GINA UI. An unauthenticated attacker can invoke these endpoints and perform actions that should be protected by a valid session, compromising the confidentiality and integrity of the gateway and potentially exposing sensitive mail data. This flaw maps to CWE-862 and is rated a CVSS score of 9.3, indicating high severity.

Affected Systems

The vulnerability affects SEPPmail Secure Email Gateway deployments running any version earlier than 15.0.4. No additional product or subsystem information is listed.

Risk and Exploitability

The Attack Vector is remote, as the unauthenticated requests are sent over the network to the GINA UI endpoints. An attacker needs only network access to the gateway and does not require valid credentials. The lack of authentication checks allows the exploitation of privileged functions via simple HTTP requests. EPSS data is not available, but the CVSS score of 9.3 suggests that exploitation is likely if the gateway is exposed. The vulnerability is not yet listed in the CISA KEV catalog.

Generated by OpenCVE AI on May 8, 2026 at 15:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade SEPPmail Secure Email Gateway to version 15.0.4 or later to apply the official fix.
  • If an immediate upgrade is not possible, block unauthenticated requests to the GINA UI endpoints using a firewall or reverse‑proxy rule until the patch can be applied.
  • After applying the fix or blocking the endpoints, monitor gateway logs for any unauthorized GINA UI activity and investigate suspicious requests.

Generated by OpenCVE AI on May 8, 2026 at 15:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 08 May 2026 13:30:00 +0000

Type Values Removed Values Added
Description SEPPmail Secure Email Gateway before version 15.0.4 fails to enforce authorization checks for multiple endpoints in the new GINA UI, allowing unauthenticated remote attackers to access functionality that should require a valid session.
Title Missing Authorization in GINAv2
Weaknesses CWE-862
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC.ch

Published:

Updated: 2026-05-08T21:27:29.024Z

Reserved: 2026-05-05T12:56:43.131Z

Link: CVE-2026-44125

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-05-08T14:16:45.383

Modified: 2026-05-08T15:51:08.590

Link: CVE-2026-44125

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T15:15:10Z

Weaknesses