SEPPmail through 12.1.17 allows command injection within the Admin Portal. An authenticated attacker is able to execute arbitrary code in the context of the user root.
References
| Link | Resource |
|---|---|
| https://code-white.com/public-vulnerability-list/ | Third Party Advisory |
| https://www.seppmail.com/products/ | Product |
Configurations
History
14 May 2025, 18:58
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:seppmail:seppmail:*:*:*:*:*:*:*:* | |
| References | () https://code-white.com/public-vulnerability-list/ - Third Party Advisory | |
| References | () https://www.seppmail.com/products/ - Product | |
| First Time |
Seppmail
Seppmail seppmail |
29 Apr 2025, 13:52
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
28 Apr 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-04-28 16:15
Updated : 2025-05-14 18:58
NVD link : CVE-2022-41871
Mitre link : CVE-2022-41871
CVE.ORG link : CVE-2022-41871
JSON object : View
Products Affected
seppmail
- seppmail
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
