Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to version 1.4.10, the verifyIdentity() function contained logic that returned true if no session cookies were present. This allowed unauthenticated attackers to bypass security checks and access/modify user settings via the /api/settings endpoint by providing arbitrary headers. This issue has been patched in version 1.4.10.
References
| Link | Resource |
|---|---|
| https://github.com/bulwarkmail/webmail/releases/tag/1.4.10 | Product |
| https://github.com/bulwarkmail/webmail/security/advisories/GHSA-4356-876g-rfmh | Vendor Advisory |
Configurations
History
09 Apr 2026, 21:14
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Bulwarkmail webmail
Bulwarkmail |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| References | () https://github.com/bulwarkmail/webmail/releases/tag/1.4.10 - Product | |
| References | () https://github.com/bulwarkmail/webmail/security/advisories/GHSA-4356-876g-rfmh - Vendor Advisory | |
| CPE | cpe:2.3:a:bulwarkmail:webmail:*:*:*:*:*:*:*:* |
02 Apr 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-02 20:16
Updated : 2026-04-09 21:14
NVD link : CVE-2026-34834
Mitre link : CVE-2026-34834
CVE.ORG link : CVE-2026-34834
JSON object : View
Products Affected
bulwarkmail
- webmail
CWE
CWE-287
Improper Authentication
