CVE-2025-65318

When using the attachment interaction functionality, Canary Mail 5.1.40 and below saves documents to a file system without a Mark-of-the-Web tag, which allows attackers to bypass the built-in file protection mechanisms of both Windows OS and third-party software.
Configurations

Configuration 1 (hide)

cpe:2.3:a:canarymail:canary_mail:*:*:*:*:*:windows:*:*

History

31 Dec 2025, 00:38

Type Values Removed Values Added
First Time Canarymail canary Mail
Canarymail
CPE cpe:2.3:a:canarymail:canary_mail:*:*:*:*:*:windows:*:*
References () http://canary.com - () http://canary.com - Broken Link
References () http://canarymail.com - () http://canarymail.com - Broken Link
References () https://drive.google.com/file/d/14wrTzvcLPfFsWmy-SAtDwwZKKPssBsx5/view - () https://drive.google.com/file/d/14wrTzvcLPfFsWmy-SAtDwwZKKPssBsx5/view - Exploit
References () https://github.com/bbaboha/CVE-2025-65318-and-CVE-2025-65319 - () https://github.com/bbaboha/CVE-2025-65318-and-CVE-2025-65319 - Exploit, Third Party Advisory
References () https://github.com/nickvourd/RTI-Toolkit - () https://github.com/nickvourd/RTI-Toolkit - Not Applicable

17 Dec 2025, 19:16

Type Values Removed Values Added
CWE CWE-693
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1
References () https://github.com/bbaboha/CVE-2025-65318-and-CVE-2025-65319 - () https://github.com/bbaboha/CVE-2025-65318-and-CVE-2025-65319 -

16 Dec 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-16 16:15

Updated : 2025-12-31 00:38


NVD link : CVE-2025-65318

Mitre link : CVE-2025-65318

CVE.ORG link : CVE-2025-65318


JSON object : View

Products Affected

canarymail

  • canary_mail
CWE
CWE-693

Protection Mechanism Failure