Impact
A remote attacker can exploit an unauthenticated path traversal flaw in the identifier parameter of /api.app/attachment/preview to read any local file on the SEPPmail Secure Email Gateway host, and trigger the deletion of files in the target directory using the privileges of the api.app process. This can lead to both confidentiality compromise and loss or alteration of important system or configuration files.
Affected Systems
SEPPmail AG Secure Email Gateway versions prior to 15.0.4 are affected. The vulnerability exists in all builds before 15.0.4 and permits exploitation regardless of user authentication.
Risk and Exploitability
The CVSS score of 8.8 indicates high severity, but the EPSS score is not available, and the vulnerability is not listed in CISA KEV. Attackers can send crafted HTTP requests to /api.app/attachment/preview from any remote host with no authentication required, making the vulnerability highly exploitable in exposed environments.
OpenCVE Enrichment