HSC MailInspector 5.3.3-7 has a Path Traversal vulnerability due to improper validation of user-supplied input in the /tap/dw.php endpoint. The text parameter is used to construct file paths without adequate normalization or restriction to a safe base directory. A remote attacker can exploit this flaw to access arbitrary files on the underlying operating system, resulting in unauthorized disclosure of sensitive information.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 18 May 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | HSC MailInspector 5.3.3-7 has a Path Traversal vulnerability due to improper validation of user-supplied input in the /tap/dw.php endpoint. The text parameter is used to construct file paths without adequate normalization or restriction to a safe base directory. A remote attacker can exploit this flaw to access arbitrary files on the underlying operating system, resulting in unauthorized disclosure of sensitive information. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-18T17:07:22.444Z
Reserved: 2026-03-04T00:00:00.000Z
Link: CVE-2026-29963
No data.
Status : Received
Published: 2026-05-18T18:17:21.517
Modified: 2026-05-18T18:17:21.517
Link: CVE-2026-29963
No data.
OpenCVE Enrichment
No data.
Weaknesses
No weakness.