CVE-2025-34396

MailEnable versions prior to 10.54 contain an unsafe DLL loading vulnerability that can lead to local arbitrary code execution. The MailEnable administrative executable attempts to load MEAINFY.DLL from its application directo without sufficient integrity validation or secure search order. If the DLL is missing or attacker-writable locations in the search path are used, a local attacker with write permissions to the directory can plant a malicious MEAINFY.DLL. When the executable is launched, it loads the attacker-controlled library and executes code with the privileges of the process, enabling local privilege escalation when run with elevated rights.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mailenable:mailenable:*:*:*:*:standard:*:*:*

History

10 Dec 2025, 19:05

Type Values Removed Values Added
References () https://mailenable.com/Standard-ReleaseNotes.txt - () https://mailenable.com/Standard-ReleaseNotes.txt - Release Notes
References () https://www.mailenable.com/ - () https://www.mailenable.com/ - Product
References () https://www.vulncheck.com/advisories/mailenable-dll-hijacking-via-unsafe-loading-of-meainfy-dll - () https://www.vulncheck.com/advisories/mailenable-dll-hijacking-via-unsafe-loading-of-meainfy-dll - Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.3
CPE cpe:2.3:a:mailenable:mailenable:*:*:*:*:standard:*:*:*
First Time Mailenable mailenable
Mailenable

09 Dec 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-09 18:15

Updated : 2025-12-10 19:05


NVD link : CVE-2025-34396

Mitre link : CVE-2025-34396

CVE.ORG link : CVE-2025-34396


JSON object : View

Products Affected

mailenable

  • mailenable
CWE
CWE-427

Uncontrolled Search Path Element