CVE-2025-68723

9.0 CRITICAL

📋 TL;DR

Axigen Mail Server versions before 10.5.57 contain multiple stored XSS vulnerabilities in the WebAdmin interface. Attackers can inject malicious JavaScript that executes in administrators' browsers, potentially enabling privilege escalation attacks where low-privileged admins can force high-privileged admins to perform unauthorized actions. This affects organizations using Axigen Mail Server with WebAdmin access.

💻 Affected Systems

Products:
  • Axigen Mail Server
Versions: All versions before 10.5.57
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WebAdmin interface access. Vulnerabilities exist in three specific WebAdmin features: Local Services Log page, SSL Certificates View Usage, and WebMail Listeners SSL settings.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the mail server through privilege escalation, allowing attackers to gain administrative control, access sensitive email data, and potentially pivot to other systems.

🟠

Likely Case

Unauthorized administrative actions performed by high-privileged admins due to malicious JavaScript execution, potentially leading to data exposure, configuration changes, or further system compromise.

🟢

If Mitigated

Limited impact due to proper access controls, network segmentation, and administrator awareness preventing successful exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access to WebAdmin interface (low-privileged admin account sufficient). Attackers need to inject payloads into specific parameters that administrators later view.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.5.57

Vendor Advisory: https://www.axigen.com/knowledgebase/Axigen-WebAdmin-Stored-XSS-Vulnerabilities-CVE-2025-68723-_408.html

Restart Required: Yes

Instructions:

1. Download Axigen Mail Server version 10.5.57 or later from the official website. 2. Backup current configuration and data. 3. Install the updated version following vendor instructions. 4. Restart the Axigen Mail Server service.

🔧 Temporary Workarounds

Restrict WebAdmin Access

all

Limit WebAdmin interface access to trusted IP addresses only using firewall rules or network segmentation.

Disable Vulnerable Features

all

Temporarily disable or restrict access to the affected WebAdmin features: Local Services Log page, SSL Certificates View Usage, and WebMail Listeners SSL settings.

🧯 If You Can't Patch

  • Implement strict input validation and output encoding for the affected parameters in custom configurations
  • Monitor WebAdmin access logs for suspicious activity and implement alerting for XSS payload patterns

🔍 How to Verify

Check if Vulnerable:

Check current Axigen version via WebAdmin interface or command line. If version is below 10.5.57, the system is vulnerable.

Check Version:

On Linux: /opt/axigen/bin/axigen --version | grep Version

Verify Fix Applied:

After patching, verify the version is 10.5.57 or higher and test the affected WebAdmin features for proper input sanitization.

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript payloads in WebAdmin parameter inputs
  • Multiple failed login attempts followed by successful low-privileged admin access
  • Administrative actions performed from unexpected user accounts

Network Indicators:

  • HTTP requests containing JavaScript payloads to WebAdmin endpoints
  • Unusual patterns of administrative interface access

SIEM Query:

source="axigen_logs" AND ("<script>" OR "javascript:" OR "onerror=" OR "onload=") AND (uri_path="/admin/" OR user_agent="WebAdmin")

🔗 References

📤 Share & Export