CVE-2026-23620

4.3 MEDIUM

📋 TL;DR

GFI MailEssentials AI versions before 22.4 contain an authenticated file enumeration vulnerability. An authenticated attacker can check whether arbitrary files exist on the server by manipulating the 'path' parameter in the ListServer.IsDBExist() web method. This affects organizations using vulnerable versions of GFI MailEssentials AI.

💻 Affected Systems

Products:
  • GFI MailEssentials AI
Versions: All versions prior to 22.4
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the web interface. The vulnerability is in the ListServer.aspx component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could map the server filesystem, identify sensitive files (config files, credentials, databases), and use this information for further attacks like data theft or privilege escalation.

🟠

Likely Case

Information disclosure about server filesystem structure, potentially revealing configuration files, backup locations, or other sensitive file paths that could aid in targeted attacks.

🟢

If Mitigated

Limited information disclosure with no direct data exposure, though file existence knowledge could still assist attackers in reconnaissance.

🌐 Internet-Facing: MEDIUM - Requires authentication but could be exploited if web interface is exposed to internet with compromised credentials.
🏢 Internal Only: MEDIUM - Authenticated internal users could abuse this to map server filesystems and gather intelligence for lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and involves sending crafted HTTP POST requests with manipulated JSON parameters to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 22.4

Vendor Advisory: https://gfi.ai/products-and-solutions/network-security-solutions/mailessentials/resources/documentation/product-releases

Restart Required: Yes

Instructions:

1. Download GFI MailEssentials AI version 22.4 or later from the vendor portal. 2. Run the installer to upgrade. 3. Restart the GFI MailEssentials service. 4. Verify the version is 22.4 or higher.

🔧 Temporary Workarounds

Restrict Access to Vulnerable Endpoint

windows

Use web application firewall or IIS URL rewrite rules to block access to /MailEssentials/pages/MailSecurity/ListServer.aspx

IIS URL Rewrite Rule: <rule name="Block ListServer" stopProcessing="true"><match url="^MailEssentials/pages/MailSecurity/ListServer.aspx" /><action type="AbortRequest" /></rule>

Implement Strong Authentication Controls

all

Enforce multi-factor authentication and strong password policies for all MailEssentials AI administrative accounts.

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to the MailEssentials AI web interface to only trusted administrative networks.
  • Enable detailed logging for the ListServer.aspx endpoint and monitor for unusual file path requests in the path parameter.

🔍 How to Verify

Check if Vulnerable:

Check the GFI MailEssentials AI version in the administrative interface. If version is below 22.4, the system is vulnerable.

Check Version:

Check Help > About in GFI MailEssentials AI web interface or examine installed programs in Windows Control Panel.

Verify Fix Applied:

After patching, verify the version shows 22.4 or higher in the administrative interface and test that the IsDBExist endpoint properly validates file paths.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /MailEssentials/pages/MailSecurity/ListServer.aspx/IsDBExist with unusual file paths in the JSON payload
  • Multiple failed file existence checks to sensitive system paths

Network Indicators:

  • Unusual patterns of POST requests to the vulnerable endpoint from single authenticated users
  • Requests containing file paths outside expected application directories

SIEM Query:

source="IIS" AND cs_uri_stem="/MailEssentials/pages/MailSecurity/ListServer.aspx/IsDBExist" AND cs_method="POST" AND cs_uri_query CONTAINS "path"

🔗 References

📤 Share & Export