CVE-2026-23616

5.4 MEDIUM

📋 TL;DR

This stored XSS vulnerability in GFI MailEssentials AI allows authenticated users to inject malicious scripts into the Anti-Spoofing configuration page. When administrators view the affected page, the scripts execute in their browser context, potentially compromising their session or performing unauthorized actions. Organizations using GFI MailEssentials AI versions before 22.4 are affected.

💻 Affected Systems

Products:
  • GFI MailEssentials AI
Versions: All versions prior to 22.4
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the MailEssentials web interface. The vulnerability is in the Anti-Spoofing configuration page specifically.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated malicious insider could steal administrator session cookies, perform account takeover, and gain full administrative control over the MailEssentials system, potentially leading to email system compromise.

🟠

Likely Case

Authenticated users with malicious intent could perform session hijacking against administrators, modify email security settings, or exfiltrate sensitive configuration data.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to potential session compromise for administrators viewing the affected page.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the MailEssentials web interface. The vulnerability is straightforward to exploit once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 22.4 and later

Vendor Advisory: https://gfi.ai/products-and-solutions/network-security-solutions/mailessentials/resources/documentation/product-releases

Restart Required: Yes

Instructions:

1. Download GFI MailEssentials AI version 22.4 or later from the GFI portal. 2. Run the installer on the MailEssentials server. 3. Follow the upgrade wizard. 4. Restart the MailEssentials services after installation completes.

🔧 Temporary Workarounds

Input Validation via Web Application Firewall

all

Configure WAF rules to block HTML/JavaScript in the ctl00$ContentPlaceHolder1$AntiSpoofingGeneral1$TxtSmtpDesc parameter

Restrict Access to Anti-Spoofing Page

all

Use network segmentation or access controls to limit which users can access /MailEssentials/pages/MailSecurity/AntiSpoofing.aspx

🧯 If You Can't Patch

  • Implement strict input validation on the server-side for the TxtSmtpDesc parameter
  • Apply Content Security Policy headers to the MailEssentials web interface to restrict script execution

🔍 How to Verify

Check if Vulnerable:

Check the GFI MailEssentials AI version in the web interface under Help > About. If version is below 22.4, the system is vulnerable.

Check Version:

Not applicable - check via web interface

Verify Fix Applied:

After upgrading to version 22.4 or later, verify that HTML/JavaScript input in the Anti-Spoofing configuration description field is properly sanitized and does not execute.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /MailEssentials/pages/MailSecurity/AntiSpoofing.aspx with HTML/JavaScript in parameters
  • Multiple failed login attempts followed by successful authentication and configuration changes

Network Indicators:

  • HTTP traffic containing script tags or JavaScript in POST parameters to the Anti-Spoofing page

SIEM Query:

source="mailessentials.log" AND (uri="/MailEssentials/pages/MailSecurity/AntiSpoofing.aspx" AND (param="ctl00$ContentPlaceHolder1$AntiSpoofingGeneral1$TxtSmtpDesc" AND value CONTAINS "<script>" OR value CONTAINS "javascript:"))

🔗 References

📤 Share & Export