Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Sun, 10 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Seppmail
Seppmail secure Email Gateway |
|
| Vendors & Products |
Seppmail
Seppmail secure Email Gateway |
Fri, 08 May 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 08 May 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SEPPmail Secure Email Gateway before version 15.0.4 contains an unauthenticated path traversal vulnerability in the identifier parameter of /api.app/attachment/preview that allows remote attackers to read arbitrary local files and trigger deletion of files in the targeted directory with the privileges of the api.app process. | |
| Title | Local File Inclusion (LFI) and Arbitrary File Deletion | |
| Weaknesses | CWE-73 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: NCSC.ch
Published:
Updated: 2026-05-13T08:24:02.805Z
Reserved: 2026-05-05T12:56:43.132Z
Link: CVE-2026-44127
Updated: 2026-05-08T14:26:23.803Z
Status : Deferred
Published: 2026-05-08T14:16:45.730
Modified: 2026-05-08T15:51:08.590
Link: CVE-2026-44127
No data.
OpenCVE Enrichment
Updated: 2026-05-10T20:00:05Z