CVE-2026-23618

5.4 MEDIUM

📋 TL;DR

This stored XSS vulnerability in GFI MailEssentials AI allows authenticated users to inject malicious scripts into the spam keyword checking interface. When administrators view the management interface, the scripts execute in their session context, potentially compromising administrative accounts. This affects organizations using GFI MailEssentials AI versions before 22.4.

💻 Affected Systems

Products:
  • GFI MailEssentials AI
Versions: All versions prior to 22.4
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access to the MailEssentials web interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with authenticated access could steal administrator session cookies, perform administrative actions as the victim, or pivot to other systems using the compromised account.

🟠

Likely Case

Privilege escalation within the MailEssentials application, allowing attackers to modify security settings, access sensitive email data, or maintain persistence.

🟢

If Mitigated

Limited to authenticated users only, with proper input validation and output encoding preventing successful exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the web interface and knowledge of the vulnerable parameter.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 22.4 or later

Vendor Advisory: https://gfi.ai/products-and-solutions/network-security-solutions/mailessentials/resources/documentation/product-releases

Restart Required: Yes

Instructions:

1. Download GFI MailEssentials AI version 22.4 or later from the official vendor portal. 2. Run the installer on the MailEssentials server. 3. Follow the upgrade wizard prompts. 4. Restart the MailEssentials services after installation completes.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement web application firewall rules or input validation to block HTML/JavaScript in the vulnerable parameter

Access Restriction

windows

Restrict access to /MailEssentials/pages/MailSecurity/ASKeywordChecking.aspx to trusted administrators only

🧯 If You Can't Patch

  • Implement strict input validation on the ctl00$ContentPlaceHolder1$pvSubject$TXB_SubjectCondition parameter to reject HTML/JavaScript content
  • Apply output encoding when rendering user-supplied content in the management interface to neutralize script execution

🔍 How to Verify

Check if Vulnerable:

Check if current GFI MailEssentials AI version is below 22.4 in the administration interface

Check Version:

Check Help > About in MailEssentials web interface or examine installed programs in Windows Control Panel

Verify Fix Applied:

Confirm version is 22.4 or higher and test that HTML/JavaScript input in the spam keyword subject field is properly sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTML/JavaScript patterns in spam keyword configuration logs
  • Multiple failed login attempts followed by successful authentication and configuration changes

Network Indicators:

  • POST requests to /MailEssentials/pages/MailSecurity/ASKeywordChecking.aspx containing script tags or JavaScript in parameters

SIEM Query:

source="mailessentials" AND (uri="/MailEssentials/pages/MailSecurity/ASKeywordChecking.aspx" AND (param="ctl00$ContentPlaceHolder1$pvSubject$TXB_SubjectCondition" AND value CONTAINS "<script>" OR value CONTAINS "javascript:"))

🔗 References

📤 Share & Export