Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 11 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 10 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mailenable
Mailenable mailenable Enterprise |
|
| Vendors & Products |
Mailenable
Mailenable mailenable Enterprise |
Fri, 08 May 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | MailEnable Enterprise Premium 10.55 and earlier contains an improper authorization vulnerability in the WebAdmin mobile portal that allows attackers to bypass authentication checks by reusing AuthenticationToken cookies generated for low-privileged users. Attackers can obtain a token from the WebMail login endpoint using the PersistentLogin parameter and replay it against the WebAdmin portal to perform highly privileged administrative actions. | |
| Title | MailEnable Enterprise Premium < 10.55 Authorization Bypass via WebAdmin | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-11T23:11:50.999Z
Reserved: 2026-05-05T21:38:43.137Z
Link: CVE-2026-44400
Updated: 2026-05-11T18:17:07.696Z
Status : Awaiting Analysis
Published: 2026-05-08T21:16:28.260
Modified: 2026-05-13T15:30:03.317
Link: CVE-2026-44400
No data.
OpenCVE Enrichment
Updated: 2026-05-10T20:00:05Z