Description
MailEnable Enterprise Premium 10.55 and earlier contains an improper authorization vulnerability in the WebAdmin mobile portal that allows attackers to bypass authentication checks by reusing AuthenticationToken cookies generated for low-privileged users. Attackers can obtain a token from the WebMail login endpoint using the PersistentLogin parameter and replay it against the WebAdmin portal to perform highly privileged administrative actions.
Published: 2026-05-08
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The flaw is an improper authorization in the WebAdmin mobile portal that lets an attacker replay an authentication token issued for a low‑privileged user across the portal boundary. By sending the same AuthenticationToken cookie captured from the WebMail login endpoint, the attacker can bypass the WebAdmin authentication checks and carry out any high‑privileged administrative operation. This bug falls under CWE‑639 and can lead to full administrative takeover of the MailEnable server.

Affected Systems

This issue affects MailEnable Enterprise Premium versions 10.55 and earlier. The vulnerability is confined to the WebAdmin mobile portal component of the Enterprise Premium edition; other MailEnable products or newer Enterprise Premium releases are not affected.

Risk and Exploitability

The CVSS score of 8.7 classifies the flaw as high severity, and because no active exploit is reported in the KEV catalog the risk is primarily theoretical. An attacker would need to obtain or forge an AuthenticationToken cookie for a low‑privileged user – for example by logging in to the WebMail interface with valid credentials or intercepting the cookie – and then replay it against the WebAdmin endpoint. The ability to perform privileged actions makes this a serious threat, especially in environments where JavaScript‑enabled browsers are used. Therefore, organizations should treat this as a critical security concern while a patch is applied.

Generated by OpenCVE AI on May 8, 2026 at 21:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest version of MailEnable Enterprise Premium that is newer than 10.55, which resolves the authorization bypass.
  • If an upgrade cannot be performed immediately, restrict or disable the PersistentLogin feature for low‑privileged users to prevent token reuse across interfaces.
  • Actively monitor WebMail and WebAdmin logs for unusual traffic patterns, such as repeated use of the same authentication token across portals, and block the sources of such activity.

Generated by OpenCVE AI on May 8, 2026 at 21:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 08 May 2026 20:45:00 +0000

Type Values Removed Values Added
Description MailEnable Enterprise Premium 10.55 and earlier contains an improper authorization vulnerability in the WebAdmin mobile portal that allows attackers to bypass authentication checks by reusing AuthenticationToken cookies generated for low-privileged users. Attackers can obtain a token from the WebMail login endpoint using the PersistentLogin parameter and replay it against the WebAdmin portal to perform highly privileged administrative actions.
Title MailEnable Enterprise Premium < 10.55 Authorization Bypass via WebAdmin
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-08T20:22:43.554Z

Reserved: 2026-05-05T21:38:43.137Z

Link: CVE-2026-44400

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T21:16:28.260

Modified: 2026-05-08T21:16:28.260

Link: CVE-2026-44400

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T21:30:05Z

Weaknesses