SEPPmail Secure Email Gateway before version 15.0.2.1 allows unauthenticated remote code execution in the new GINA UI because an endpoint passes attacker-controlled input from a parameter to Perl's eval.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 08 May 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SEPPmail Secure Email Gateway before version 15.0.2.1 allows unauthenticated remote code execution in the new GINA UI because an endpoint passes attacker-controlled input from a parameter to Perl's eval. | |
| Title | Unauthenticated Remote Code Execution | |
| Weaknesses | CWE-95 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: NCSC.ch
Published:
Updated: 2026-05-08T13:13:46.034Z
Reserved: 2026-05-05T12:56:43.132Z
Link: CVE-2026-44128
No data.
Status : Received
Published: 2026-05-08T14:16:45.870
Modified: 2026-05-08T14:16:45.870
Link: CVE-2026-44128
No data.
OpenCVE Enrichment
No data.
Weaknesses