CVE-2026-34833

Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to version 1.4.10, the GET /api/auth/session endpoint previously included the user's plaintext password in the JSON response. This exposed credentials to browser logs, local caches, and network proxie. This issue has been patched in version 1.4.10.
Configurations

Configuration 1 (hide)

cpe:2.3:a:bulwarkmail:webmail:*:*:*:*:*:*:*:*

History

09 Apr 2026, 21:13

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
First Time Bulwarkmail webmail
Bulwarkmail
CPE cpe:2.3:a:bulwarkmail:webmail:*:*:*:*:*:*:*:*
References () https://github.com/bulwarkmail/webmail/releases/tag/1.4.10 - () https://github.com/bulwarkmail/webmail/releases/tag/1.4.10 - Product
References () https://github.com/bulwarkmail/webmail/security/advisories/GHSA-47pm-883h-885r - () https://github.com/bulwarkmail/webmail/security/advisories/GHSA-47pm-883h-885r - Vendor Advisory

02 Apr 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-02 20:16

Updated : 2026-04-09 21:13


NVD link : CVE-2026-34833

Mitre link : CVE-2026-34833

CVE.ORG link : CVE-2026-34833


JSON object : View

Products Affected

bulwarkmail

  • webmail
CWE
CWE-312

Cleartext Storage of Sensitive Information