CVE-2026-23606

5.4 MEDIUM

📋 TL;DR

This stored cross-site scripting vulnerability in GFI MailEssentials AI allows authenticated users to inject malicious scripts into the Advanced Content Filtering rule creation workflow. The scripts are stored and executed when administrators view the management interface, potentially compromising administrative sessions. Organizations using GFI MailEssentials AI versions before 22.4 are affected.

💻 Affected Systems

Products:
  • GFI MailEssentials AI
Versions: All versions prior to 22.4
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access to the MailEssentials management interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with authenticated access could steal administrator session cookies, perform actions as administrators, or redirect users to malicious sites, potentially leading to full system compromise.

🟠

Likely Case

Authenticated malicious users could hijack administrator sessions to modify security settings, access sensitive email data, or deploy additional malware within the email security system.

🟢

If Mitigated

With proper access controls and input validation, the impact is limited to authenticated users only, reducing the attack surface significantly.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the MailEssentials interface and knowledge of the vulnerable parameter.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 22.4

Vendor Advisory: https://gfi.ai/products-and-solutions/network-security-solutions/mailessentials/resources/documentation/product-releases

Restart Required: Yes

Instructions:

1. Download GFI MailEssentials AI version 22.4 or later from the official GFI website. 2. Backup current configuration. 3. Run the installer to upgrade to the patched version. 4. Restart the MailEssentials service and verify functionality.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement web application firewall rules or input validation to sanitize HTML/JavaScript in the ctl00$ContentPlaceHolder1$pv1$txtRuleName parameter

Access Restriction

all

Restrict access to /MailEssentials/pages/MailSecurity/advancedfiltering.aspx to trusted administrators only

🧯 If You Can't Patch

  • Implement strict input validation and output encoding for all user-supplied data in the MailEssentials interface
  • Apply principle of least privilege to MailEssentials user accounts and monitor for suspicious rule creation activities

🔍 How to Verify

Check if Vulnerable:

Check if GFI MailEssentials AI version is below 22.4 in the product administration interface

Check Version:

Check version in GFI MailEssentials AI administration dashboard under Help > About

Verify Fix Applied:

Verify the installed version is 22.4 or higher and test that HTML/JavaScript input in the rule name field is properly sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual rule creation activities
  • Multiple failed login attempts followed by rule modifications
  • Administrative actions from unexpected user accounts

Network Indicators:

  • HTTP POST requests to /MailEssentials/pages/MailSecurity/advancedfiltering.aspx with script tags in parameters

SIEM Query:

source="mailessentials" AND (url="/MailEssentials/pages/MailSecurity/advancedfiltering.aspx" AND (param="ctl00$ContentPlaceHolder1$pv1$txtRuleName" AND value CONTAINS "<script>"))

🔗 References

📤 Share & Export