Total CVEs

126,116

Critical Severity

2,290

High Severity

7,924

Last 7 Days

1,178
Quick preset (or use dates below)
Clear Filters
Showing 1 - 20 of 62 CVEs
CVE-2026-35391 HIGH - 7.5

Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to 1.4.11, the getClientIP() function in lib/admin/session.ts trusted the first (leftmost) entry of the X-Forwarded-For header, which is fully controlled by the client. An attacker could forge their source IP address to ...

Vendor: bulwarkmail
Product: webmail
Published: Apr 06, 2026
Source: NVD
CVE-2026-35390 MEDIUM - 6.1

Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to 1.4.11, the reverse proxy (proxy.ts) set the Content-Security-Policy-Report-Only header instead of the enforcing Content-Security-Policy header. This means cross-site scripting (XSS) attacks were logged but not blocke...

Vendor: bulwarkmail
Product: webmail
Published: Apr 06, 2026
Source: NVD
CVE-2026-35389 HIGH - 7.5

Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to 1.4.11, S/MIME signature verification did not validate the certificate trust chain (checkChain: false). Any email signed with a self-signed or untrusted certificate was displayed as having a valid signature. This vuln...

Vendor: bulwarkmail
Product: webmail
Published: Apr 06, 2026
Source: NVD
CVE-2026-35545 MEDIUM - 5.3

An issue was discovered in Roundcube Webmail before 1.5.15 and 1.6.15. The remote image blocking feature can be bypassed via SVG content in an e-mail message. This may lead to information disclosure or access-control bypass. This involves the animate element with attributeName=fill/filter/stroke.

Vendor: Roundcube
Product: Webmail
Published: Apr 03, 2026
Source: NVD
CVE-2026-35544 MEDIUM - 5.3

An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. Insufficient Cascading Style Sheets (CSS) sanitization in HTML e-mail messages may lead to a fixed-position mitigation bypass via the use of !important.

Vendor: Roundcube
Product: Webmail
Published: Apr 03, 2026
Source: NVD
CVE-2026-35543 MEDIUM - 5.3

An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. The remote image blocking feature can be bypassed via SVG content (with animate attributes) in an e-mail message. This may lead to information disclosure or access-control bypass.

Vendor: Roundcube
Product: Webmail
Published: Apr 03, 2026
Source: NVD
CVE-2026-35542 MEDIUM - 5.3

An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. The remote image blocking feature can be bypassed via a crafted background attribute of a BODY element in an e-mail message. This may lead to information disclosure or access-control bypass.

Vendor: Roundcube
Product: Webmail
Published: Apr 03, 2026
Source: NVD
CVE-2026-35541 MEDIUM - 4.2

An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. Incorrect password comparison in the password plugin could lead to type confusion that allows a password change without knowing the old password.

Vendor: Roundcube
Product: Webmail
Published: Apr 03, 2026
Source: NVD
CVE-2026-35540 MEDIUM - 5.4

An issue was discovered in Roundcube Webmail 1.6.0 before 1.6.14. Insufficient Cascading Style Sheets (CSS) sanitization in HTML e-mail messages may lead to SSRF or Information Disclosure, e.g., if stylesheet links point to local network hosts.

Vendor: Roundcube
Product: Webmail
Published: Apr 03, 2026
Source: NVD
CVE-2026-35539 MEDIUM - 6.1

An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. XSS exists because of insufficient HTML attachment sanitization in preview mode. A victim must preview a text/html attachment.

Vendor: Roundcube
Product: Webmail
Published: Apr 03, 2026
Source: NVD

An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. Unsanitized IMAP SEARCH command arguments could lead to IMAP injection or CSRF bypass during mail search.

Vendor: Roundcube
Product: Webmail
Published: Apr 03, 2026
Source: NVD

An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. Unsafe deserialization in the redis/memcache session handler may lead to arbitrary file write operations by unauthenticated attackers via crafted session data.

Vendor: Roundcube
Product: Webmail
Published: Apr 03, 2026
Source: NVD
CVE-2026-34834 HIGH - 7.5

Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to version 1.4.10, the verifyIdentity() function contained logic that returned true if no session cookies were present. This allowed unauthenticated attackers to bypass security checks and access/modify user settings via...

Vendor: bulwarkmail
Product: webmail
Published: Apr 02, 2026
Source: NVD
CVE-2026-34833 HIGH - 7.5

Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to version 1.4.10, the GET /api/auth/session endpoint previously included the user's plaintext password in the JSON response. This exposed credentials to browser logs, local caches, and network proxie. This issue ha...

Vendor: bulwarkmail
Product: webmail
Published: Apr 02, 2026
Source: NVD
CVE-2026-32852 MEDIUM - 6.1

MailEnable versions prior toย 10.55 contain a reflected cross-site scripting vulnerability in the webmail interface that allows remote attackers to execute arbitrary JavaScript in a victim's browser by crafting a malicious URL. Attackers can inject malicious code through the StartDate parameter ...

Vendor: MailEnable
Product: MailEnable
Published: Mar 23, 2026
Source: NVD
CVE-2026-32851 MEDIUM - 6.1

MailEnable versions prior toย 10.55 contain a reflected cross-site scripting vulnerability in the webmail interface that allows remote attackers to execute arbitrary JavaScript in a victim's browser by crafting a malicious URL. Attackers can inject malicious code through the Attendees parameter ...

Vendor: MailEnable
Product: MailEnable
Published: Mar 23, 2026
Source: NVD
CVE-2026-32850 MEDIUM - 6.1

MailEnable versions prior toย 10.55 contain a reflected cross-site scripting vulnerability in the webmail interface that allows remote attackers to execute arbitrary JavaScript in a victim's browser by crafting a malicious URL. Attackers can inject malicious code through the SelectedIndex parame...

Vendor: MailEnable
Product: MailEnable
Published: Mar 23, 2026
Source: NVD
CVE-2026-33372 MEDIUM - 5.4

An issue was discovered in Zimbra Collaboration (ZCS) 10.0 and 10.1. A cross-site request forgery (CSRF) vulnerability exists in Zimbra Webmail due to improper validation of CSRF tokens. The application accepts CSRF tokens supplied within the request body instead of requiring them through the expect...

Published: Mar 20, 2026
Source: NVD
CVE-2026-33368 MEDIUM - 6.1

Zimbra Collaboration Suite (ZCS) 10.0 and 10.1 contains a reflected cross-site scripting (XSS) vulnerability in the Classic Webmail REST interface (/h/rest). The application fails to properly sanitize user-supplied input, allowing an unauthenticated attacker to inject malicious JavaScript into a cra...

Published: Mar 20, 2026
Source: NVD
CVE-2026-26079 MEDIUM - 4.7

Roundcube Webmail before 1.5.13 and 1.6 before 1.6.13 allows Cascading Style Sheets (CSS) injection, e.g., because comments are mishandled.

Vendor: Roundcube
Product: Webmail
Published: Feb 11, 2026
Source: NVD