CVE-2026-23610

5.4 MEDIUM

📋 TL;DR

GFI MailEssentials AI versions before 22.4 contain a stored cross-site scripting vulnerability in the POP2Exchange configuration endpoint. An authenticated user can inject malicious scripts into the POP3 server login field, which are stored and executed when viewed in the management interface, potentially compromising other authenticated users' sessions. This affects organizations using vulnerable versions of GFI MailEssentials AI.

💻 Affected Systems

Products:
  • GFI MailEssentials AI
Versions: All versions prior to 22.4
Operating Systems: Windows Server (where GFI MailEssentials AI is installed)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the management interface with POP2Exchange configuration privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated malicious insider could inject scripts that steal administrator credentials, hijack sessions, or perform unauthorized administrative actions when other users view the compromised configuration page.

🟠

Likely Case

An authenticated user with configuration access could inject scripts that steal session cookies or perform limited actions within the management interface, potentially escalating privileges or accessing sensitive data.

🟢

If Mitigated

With proper input validation and output encoding, the malicious payload would be rendered harmless as text rather than executable code.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the management interface and knowledge of the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 22.4 or later

Vendor Advisory: https://gfi.ai/products-and-solutions/network-security-solutions/mailessentials/resources/documentation/product-releases

Restart Required: Yes

Instructions:

1. Download GFI MailEssentials AI version 22.4 or later from the official vendor site. 2. Backup current configuration. 3. Run the installer to upgrade. 4. Restart the GFI MailEssentials AI service. 5. Verify the update completed successfully.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement web application firewall rules or input validation to block HTML/JavaScript in the POP3 server login field.

Access Restriction

all

Restrict access to the /MailEssentials/pages/MailSecurity/POP2Exchange.aspx endpoint to only necessary administrative users.

🧯 If You Can't Patch

  • Implement strict input validation and output encoding for the POP3 server login field in the application layer.
  • Monitor and audit access to the POP2Exchange configuration endpoint for suspicious activity.

🔍 How to Verify

Check if Vulnerable:

Check the GFI MailEssentials AI version in the management interface under Help > About. If version is below 22.4, the system is vulnerable.

Check Version:

Not applicable - check version through the web interface.

Verify Fix Applied:

After updating to version 22.4 or later, attempt to inject basic HTML/JavaScript into the POP3 server login field and verify it is properly sanitized and displayed as plain text.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /MailEssentials/pages/MailSecurity/POP2Exchange.aspx/Save with HTML/JavaScript in parameters
  • Multiple failed login attempts followed by configuration changes

Network Indicators:

  • HTTP POST requests containing script tags or JavaScript functions in the popServers JSON payload

SIEM Query:

source="web_server" AND (url="/MailEssentials/pages/MailSecurity/POP2Exchange.aspx/Save" AND (request_body CONTAINS "<script>" OR request_body CONTAINS "javascript:"))

🔗 References

📤 Share & Export