Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 05 Mar 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:mailenable:mailenable:*:*:*:*:*:*:*:* |
Fri, 12 Dec 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 09 Dec 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mailenable
Mailenable mailenable |
|
| CPEs | cpe:2.3:a:mailenable:mailenable:*:*:*:*:standard:*:*:* | |
| Vendors & Products |
Mailenable
Mailenable mailenable |
|
| Metrics |
cvssV3_1
|
Tue, 09 Dec 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | MailEnable versions prior to 10.54 contain a reflected cross-site scripting (XSS) vulnerability in the Failed parameter of /Mondo/lang/sys/Forms/MAI/AddRecipientsResult.aspx. The Failed value is not properly sanitized when processed via a GET request and is reflected in the response, allowing an attacker to break out of existing markup and inject arbitrary script. A remote attacker can supply a crafted payload that closes an existing HTML list element, inserts attacker-controlled JavaScript, and comments out remaining code, leading to script execution in a victim’s browser when the victim visits a malicious link. Successful exploitation can redirect victims to malicious sites, steal non-HttpOnly cookies, inject arbitrary HTML or CSS, and perform actions as the authenticated user. | |
| Title | MailEnable < 10.54 Reflected XSS in Failed Parameter of MAI/AddRecipientsResult.aspx | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-14T02:08:28.613Z
Reserved: 2025-04-15T19:15:22.598Z
Link: CVE-2025-34409
Updated: 2025-12-12T18:58:12.161Z
Status : Analyzed
Published: 2025-12-09T18:15:51.580
Modified: 2025-12-09T20:17:18.127
Link: CVE-2025-34409
No data.
OpenCVE Enrichment
No data.