MailEnable versions prior to 10.54 contain an unsafe DLL loading vulnerability that can lead to local arbitrary code execution. The MailEnable administrative executable attempts to load MEAINFY.DLL from its application directo without sufficient integrity validation or secure search order. If the DLL is missing or attacker-writable locations in the search path are used, a local attacker with write permissions to the directory can plant a malicious MEAINFY.DLL. When the executable is launched, it loads the attacker-controlled library and executes code with the privileges of the process, enabling local privilege escalation when run with elevated rights.
References
| Link | Resource |
|---|---|
| https://mailenable.com/Standard-ReleaseNotes.txt | Release Notes |
| https://www.mailenable.com/ | Product |
| https://www.vulncheck.com/advisories/mailenable-dll-hijacking-via-unsafe-loading-of-meainfy-dll | Third Party Advisory |
Configurations
History
10 Dec 2025, 19:05
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://mailenable.com/Standard-ReleaseNotes.txt - Release Notes | |
| References | () https://www.mailenable.com/ - Product | |
| References | () https://www.vulncheck.com/advisories/mailenable-dll-hijacking-via-unsafe-loading-of-meainfy-dll - Third Party Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.3 |
| CPE | cpe:2.3:a:mailenable:mailenable:*:*:*:*:standard:*:*:* | |
| First Time |
Mailenable mailenable
Mailenable |
09 Dec 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-09 18:15
Updated : 2025-12-10 19:05
NVD link : CVE-2025-34396
Mitre link : CVE-2025-34396
CVE.ORG link : CVE-2025-34396
JSON object : View
Products Affected
mailenable
- mailenable
CWE
CWE-427
Uncontrolled Search Path Element
