Impact
SEPPmail Secure Email Gateway versions prior to 15.0.4 contain a configuration flaw that exposes server environment variables through an unauthenticated endpoint included in the new GINA UI. This weakness, which falls under CWE‑497, allows an external actor to learn configuration details, operating system data, or other system metadata that should remain confidential. The exposure does not grant elevated privileges; it simply reveals data that could aid further attacks or provide insight into the system.
Affected Systems
The vulnerability affects SEPPmail AG’s Secure Email Gateway, specifically all releases before 15.0.4. Customers using any of these versions are susceptible to the unauthenticated disclosure of environment variables via the GINA UI endpoint.
Risk and Exploitability
With a CVSS score of 6.9, the severity is moderate. No EPSS data is available and the issue is not listed in CISA’s KEV catalog, indicating no confirmed external exploitation yet. The likely attack vector is remote and unauthenticated: an attacker can send a simple HTTP request to the exposed endpoint from any network location. Once accessed, the response contains environment variables that could be leveraged for reconnaissance or to facilitate additional attacks on the system.
OpenCVE Enrichment