CVE-2026-34834

Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to version 1.4.10, the verifyIdentity() function contained logic that returned true if no session cookies were present. This allowed unauthenticated attackers to bypass security checks and access/modify user settings via the /api/settings endpoint by providing arbitrary headers. This issue has been patched in version 1.4.10.
Configurations

Configuration 1 (hide)

cpe:2.3:a:bulwarkmail:webmail:*:*:*:*:*:*:*:*

History

09 Apr 2026, 21:14

Type Values Removed Values Added
First Time Bulwarkmail webmail
Bulwarkmail
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
References () https://github.com/bulwarkmail/webmail/releases/tag/1.4.10 - () https://github.com/bulwarkmail/webmail/releases/tag/1.4.10 - Product
References () https://github.com/bulwarkmail/webmail/security/advisories/GHSA-4356-876g-rfmh - () https://github.com/bulwarkmail/webmail/security/advisories/GHSA-4356-876g-rfmh - Vendor Advisory
CPE cpe:2.3:a:bulwarkmail:webmail:*:*:*:*:*:*:*:*

02 Apr 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-02 20:16

Updated : 2026-04-09 21:14


NVD link : CVE-2026-34834

Mitre link : CVE-2026-34834

CVE.ORG link : CVE-2026-34834


JSON object : View

Products Affected

bulwarkmail

  • webmail
CWE
CWE-287

Improper Authentication