SEPPmail Secure Email Gateway before version 15.0.4 contains an unauthenticated path traversal vulnerability in the identifier parameter of /api.app/attachment/preview that allows remote attackers to read arbitrary local files and trigger deletion of files in the targeted directory with the privileges of the api.app process.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 08 May 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SEPPmail Secure Email Gateway before version 15.0.4 contains an unauthenticated path traversal vulnerability in the identifier parameter of /api.app/attachment/preview that allows remote attackers to read arbitrary local files and trigger deletion of files in the targeted directory with the privileges of the api.app process. | |
| Title | Local File Inclusion (LFI) and Arbitrary File Deletion | |
| Weaknesses | CWE-73 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: NCSC.ch
Published:
Updated: 2026-05-08T13:13:05.667Z
Reserved: 2026-05-05T12:56:43.132Z
Link: CVE-2026-44127
No data.
Status : Deferred
Published: 2026-05-08T14:16:45.730
Modified: 2026-05-08T15:51:08.590
Link: CVE-2026-44127
No data.
OpenCVE Enrichment
Updated: 2026-05-08T15:15:10Z
Weaknesses