Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Sun, 10 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Seppmail
Seppmail secure Email Gateway |
|
| Vendors & Products |
Seppmail
Seppmail secure Email Gateway |
Fri, 08 May 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 08 May 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SEPPmail Secure Email Gateway before version 15.0.4 contains a server-side template injection vulnerability in the new GINA UI because an endpoint accepts attacker-controlled template, allowing remote attackers to execute arbitrary template expressions and potentially achieve remote code execution depending on the enabled template plugins. | |
| Title | Server-side template injection | |
| Weaknesses | CWE-1336 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: NCSC.ch
Published:
Updated: 2026-05-13T08:25:46.245Z
Reserved: 2026-05-05T12:56:43.132Z
Link: CVE-2026-44129
Updated: 2026-05-08T14:13:17.013Z
Status : Deferred
Published: 2026-05-08T14:16:46.007
Modified: 2026-05-08T15:51:08.590
Link: CVE-2026-44129
No data.
OpenCVE Enrichment
Updated: 2026-05-10T20:00:05Z