Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 09 Apr 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:bulwarkmail:webmail:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Tue, 07 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 07 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bulwarkmail
Bulwarkmail webmail |
|
| Vendors & Products |
Bulwarkmail
Bulwarkmail webmail |
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to 1.4.11, S/MIME signature verification did not validate the certificate trust chain (checkChain: false). Any email signed with a self-signed or untrusted certificate was displayed as having a valid signature. This vulnerability is fixed in 1.4.11. | |
| Title | Bulwark Webmail S/MIME signature verification accepted self-signed certificates | |
| Weaknesses | CWE-295 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-07T16:19:51.168Z
Reserved: 2026-04-02T17:03:42.074Z
Link: CVE-2026-35389
Updated: 2026-04-07T16:19:46.621Z
Status : Analyzed
Published: 2026-04-06T21:16:20.580
Modified: 2026-04-09T20:58:45.777
Link: CVE-2026-35389
No data.
OpenCVE Enrichment
Updated: 2026-04-10T09:45:08Z