CVE-2025-68721

8.1 HIGH

📋 TL;DR

Axigen Mail Server versions before 10.5.57 contain an improper access control vulnerability in the WebAdmin interface. A delegated admin account with zero permissions can bypass access controls to access the SSL Certificates management endpoint, allowing unauthorized viewing, downloading, uploading, and deletion of SSL certificates. This affects organizations using Axigen Mail Server with delegated admin accounts.

💻 Affected Systems

Products:
  • Axigen Mail Server
Versions: All versions before 10.5.57
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires a delegated admin account (even with zero permissions) to exploit. Standard admin accounts are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal or replace SSL certificates, enabling man-in-the-middle attacks, impersonation of the mail server, or complete compromise of encrypted communications.

🟠

Likely Case

Unauthorized access to SSL certificates leading to potential certificate theft, service disruption, or credential harvesting from intercepted communications.

🟢

If Mitigated

Limited impact if proper network segmentation and monitoring are in place, though certificate management integrity would still be compromised.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires a delegated admin account but no special permissions. The vulnerability is in the WebAdmin interface access control logic.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.5.57

Vendor Advisory: https://www.axigen.com/knowledgebase/Axigen-WebAdmin-Improper-Access-Control-Vulnerability-CVE-2025-68721-_406.html

Restart Required: Yes

Instructions:

1. Download Axigen Mail Server version 10.5.57 or later from the official website. 2. Backup current configuration and data. 3. Install the update following Axigen's upgrade documentation. 4. Restart the Axigen service.

🔧 Temporary Workarounds

Remove or restrict delegated admin accounts

all

Temporarily remove or disable all delegated admin accounts until patching is complete.

Network access control

all

Restrict access to the WebAdmin interface to trusted IP addresses only.

🧯 If You Can't Patch

  • Review and audit all delegated admin accounts, removing any unnecessary accounts
  • Implement strict network segmentation to limit WebAdmin interface access to administrative networks only

🔍 How to Verify

Check if Vulnerable:

Check Axigen version via WebAdmin dashboard or command line. If version is below 10.5.57 and delegated admin accounts exist, the system is vulnerable.

Check Version:

On Linux: /opt/axigen/bin/axigen --version or check WebAdmin interface. On Windows: Check installed programs or Axigen service properties.

Verify Fix Applied:

After upgrading to 10.5.57 or later, verify that delegated admin accounts with zero permissions cannot access the SSL Certificates management endpoint (page=sslcerts).

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to page=sslcerts endpoint
  • SSL certificate management actions from delegated admin accounts
  • Failed permission checks in WebAdmin logs

Network Indicators:

  • Unusual SSL certificate download/upload traffic from non-admin sources
  • Access to WebAdmin SSL endpoints from unexpected IPs

SIEM Query:

source="axigen" AND (uri="*page=sslcerts*" OR action="certificate_*") AND user_role="delegated_admin"

🔗 References

📤 Share & Export