CVE-2025-68643

5.4 MEDIUM

📋 TL;DR

Axigen Mail Server versions before 10.5.57 contain a stored cross-site scripting (XSS) vulnerability in the timeFormat account preference parameter. Attackers can inject malicious JavaScript that executes when victims access the WebMail interface, potentially compromising user sessions and data. This affects all organizations running vulnerable Axigen Mail Server instances.

💻 Affected Systems

Products:
  • Axigen Mail Server
Versions: All versions before 10.5.57
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with WebMail interface enabled are vulnerable. The vulnerability requires either compromised credentials or another vulnerability for initial payload injection.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, hijack user sessions, deploy ransomware, exfiltrate sensitive email data, or pivot to internal network systems.

🟠

Likely Case

Session hijacking, credential theft, phishing attacks from compromised accounts, and data exfiltration from user mailboxes.

🟢

If Mitigated

Limited to individual user account compromise if proper network segmentation and web application firewalls are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires two-stage attack: first stage to inject payload (needs credentials or another vulnerability), second stage when victim accesses WebMail. Stored XSS makes exploitation more reliable than reflected XSS.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.5.57

Vendor Advisory: https://www.axigen.com/knowledgebase/Axigen-WebMail-Stored-XSS-Vulnerability-CVE-2025-68643-_405.html

Restart Required: Yes

Instructions:

1. Download Axigen Mail Server version 10.5.57 or later from vendor website. 2. Backup current configuration and data. 3. Install the update following vendor documentation. 4. Restart Axigen services. 5. Verify WebMail interface functions correctly.

🔧 Temporary Workarounds

Disable WebMail Interface

all

Temporarily disable the WebMail interface to prevent exploitation while planning upgrade

Edit Axigen configuration to disable WebMail service

Implement WAF Rules

all

Deploy web application firewall rules to block XSS payloads in timeFormat parameter

🧯 If You Can't Patch

  • Implement strict input validation and output encoding for timeFormat parameter
  • Enable Content Security Policy (CSP) headers to restrict script execution

🔍 How to Verify

Check if Vulnerable:

Check Axigen version via admin interface or command line: axigen --version

Check Version:

axigen --version

Verify Fix Applied:

Verify version is 10.5.57 or higher and test WebMail interface for proper time format display

📡 Detection & Monitoring

Log Indicators:

  • Unusual modifications to user preferences
  • Multiple failed login attempts followed by preference changes
  • JavaScript payloads in timeFormat parameter logs

Network Indicators:

  • Suspicious JavaScript in HTTP POST requests to preference endpoints
  • Unusual outbound connections from WebMail server

SIEM Query:

source="axigen" AND (event="preference_update" AND parameter="timeFormat" AND value CONTAINS "script")

🔗 References

📤 Share & Export