Description
SEPPmail Secure Email Gateway before version 15.0.2.1 allows unauthenticated remote code execution in the new GINA UI because an endpoint passes attacker-controlled input from a parameter to Perl's eval.
Published: 2026-05-08
Score: 9.3 Critical
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability arises from the SEPPmail Secure Email Gateway GINA UI passing attacker‑controlled input directly to Perl's eval function without validation. This allows anyone who can reach the endpoint to execute arbitrary code, giving attackers full control over the gateway and compromising all email traffic it handles. The flaw is a classic dynamic code injection identified as CWE‑95.

Affected Systems

SEPPmail AG Secure Email Gateway versions prior to 15.0.2.1 are affected. The issue exists in the new GINA UI component of the product, and users running versions 15.0 or earlier are vulnerable.

Risk and Exploitability

The CVSS score of 9.3 denotes a critical issue. EPSS information is not available, and the vulnerability is not listed in the CISA KEV catalog, but the lack of authentication means an attacker can trigger the flaw from any network location that can reach the GINA UI endpoint. The risk is high because exploitation yields full remote code execution, making the flaw attractive to attackers. The attack surface is inferred to be a remote network vector based on the description of unauthenticated access.

Generated by OpenCVE AI on May 8, 2026 at 15:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade SEPPmail Secure Email Gateway to version 15.0.2.1 or later.
  • If an upgrade cannot be performed immediately, isolate the GINA UI component from external networks or block inbound traffic to the endpoint that accepts user parameters.
  • Modify the application configuration to implement strict input validation before invoking Perl's eval, following the guidelines for preventing dynamic code injection (CWE‑95).

Generated by OpenCVE AI on May 8, 2026 at 15:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 08 May 2026 13:30:00 +0000

Type Values Removed Values Added
Description SEPPmail Secure Email Gateway before version 15.0.2.1 allows unauthenticated remote code execution in the new GINA UI because an endpoint passes attacker-controlled input from a parameter to Perl's eval.
Title Unauthenticated Remote Code Execution
Weaknesses CWE-95
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC.ch

Published:

Updated: 2026-05-08T21:27:48.160Z

Reserved: 2026-05-05T12:56:43.132Z

Link: CVE-2026-44128

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-05-08T14:16:45.870

Modified: 2026-05-08T15:51:08.590

Link: CVE-2026-44128

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T15:15:10Z

Weaknesses