Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 09 Mar 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:seppmail:seppmail:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Fri, 06 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Seppmail
Seppmail seppmail |
|
| Vendors & Products |
Seppmail
Seppmail seppmail |
Thu, 05 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 05 Mar 2026 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Arbitrary File Write via Path Traversal upload to Remote Code Execution in SeppMail User Web Interface. The affected feature is the large file transfer (LFT). This issue affects SeppMail: 15.0.2.1 and before | |
| Title | SEPPmail User Web Interface Arbitrary File Write to RCE | |
| Weaknesses | CWE-22 CWE-434 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: NCSC.ch
Published:
Updated: 2026-03-05T15:18:26.038Z
Reserved: 2026-02-19T12:28:37.148Z
Link: CVE-2026-2743
Updated: 2026-03-05T15:18:22.097Z
Status : Analyzed
Published: 2026-03-05T07:16:14.670
Modified: 2026-03-09T18:31:01.173
Link: CVE-2026-2743
No data.
OpenCVE Enrichment
Updated: 2026-04-16T12:45:35Z