CVE-2026-23614

5.4 MEDIUM

📋 TL;DR

This stored cross-site scripting vulnerability in GFI MailEssentials AI allows authenticated users to inject malicious scripts into the Sender Policy Framework IP Exceptions interface. When administrators view the management interface, these scripts execute in their browser context, potentially compromising administrative accounts. The vulnerability affects GFI MailEssentials AI versions before 22.4.

💻 Affected Systems

Products:
  • GFI MailEssentials AI
Versions: All versions prior to 22.4
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the MailEssentials web interface. The vulnerability is in the Sender Policy Framework IP Exceptions management page.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could steal administrator session cookies, perform actions as the administrator (including adding malicious IP exceptions, changing security settings, or accessing sensitive email data), and potentially pivot to other systems.

🟠

Likely Case

An authenticated malicious insider or compromised account could steal administrator credentials, modify SPF settings to allow spoofed emails, or deface the management interface.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to the specific administrator account viewing the malicious content, with no lateral movement or data exfiltration.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the web interface. The vulnerability is straightforward to exploit once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 22.4 or later

Vendor Advisory: https://gfi.ai/products-and-solutions/network-security-solutions/mailessentials/resources/documentation/product-releases

Restart Required: Yes

Instructions:

1. Download GFI MailEssentials AI version 22.4 or later from the GFI customer portal. 2. Run the installer on the MailEssentials server. 3. Follow the upgrade wizard. 4. Restart the MailEssentials services when prompted.

🔧 Temporary Workarounds

Input Validation via Web Application Firewall

all

Configure WAF rules to block HTML/JavaScript in the ctl00$ContentPlaceHolder1$pv2$txtIPDescription parameter

Restrict Access to Management Interface

all

Limit access to /MailEssentials/pages/MailSecurity/SenderPolicyFramework.aspx to trusted administrator IP addresses only

🧯 If You Can't Patch

  • Implement strict input validation for the txtIPDescription field to reject HTML/JavaScript content
  • Monitor and audit all changes to SPF IP exceptions for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check if GFI MailEssentials AI version is below 22.4. Navigate to the Sender Policy Framework IP Exceptions page and verify if HTML input in the description field is properly sanitized.

Check Version:

Check the version in the MailEssentials web interface under Help > About, or examine the installed programs list in Windows Control Panel.

Verify Fix Applied:

After upgrading to version 22.4 or later, attempt to inject HTML/JavaScript in the txtIPDescription field and verify it is properly sanitized or rejected.

📡 Detection & Monitoring

Log Indicators:

  • Unusual modifications to SPF IP exceptions
  • Multiple failed login attempts followed by successful authentication
  • Administrator account accessing unusual pages or performing unexpected actions

Network Indicators:

  • HTTP POST requests to /MailEssentials/pages/MailSecurity/SenderPolicyFramework.aspx with HTML/JavaScript in parameters
  • Unusual outbound connections from the MailEssentials server

SIEM Query:

source="MailEssentials" AND (url="/MailEssentials/pages/MailSecurity/SenderPolicyFramework.aspx" AND (param="ctl00$ContentPlaceHolder1$pv2$txtIPDescription" AND value CONTAINS "<script>" OR value CONTAINS "javascript:"))

🔗 References

📤 Share & Export