Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25080: n/a

0
Medium
VulnerabilityCVE-2024-25080cvecve-2024-25080
Published: Mon Apr 01 2024 (04/01/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

WebMail in Axigen 10.x before 10.3.3.62 allows XSS via the image attachment viewer.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 10:29:14 UTC

Technical Analysis

CVE-2024-25080 identifies a cross-site scripting (XSS) vulnerability in the WebMail interface of Axigen mail server versions before 10.3.3.62. Specifically, the vulnerability resides in the image attachment viewer component, which fails to properly sanitize or encode user-supplied input embedded in image attachments. This allows an attacker to craft a malicious email containing an image attachment with embedded script code. When a user views this attachment in the WebMail client, the malicious script executes within the victim's browser context. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS v3.1 base score is 4.7, reflecting a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), indicating that the vulnerability can affect resources beyond the vulnerable component, and the impact is limited to integrity (I:L) with no confidentiality (C:N) or availability (A:N) impact. No patches or exploit code links are currently provided, and no known exploits have been observed in the wild. However, the vulnerability could be leveraged in targeted phishing campaigns to execute malicious scripts, potentially leading to session hijacking, defacement, or other integrity-related impacts within the WebMail session. The vulnerability affects all Axigen WebMail 10.x versions prior to 10.3.3.62, a widely used mail server solution in various enterprise and service provider environments.

Potential Impact

The primary impact of CVE-2024-25080 is on the integrity of the WebMail user session. Successful exploitation allows attackers to execute arbitrary scripts in the context of the victim's browser, potentially enabling session hijacking, manipulation of displayed content, or execution of further malicious actions such as redirecting users to phishing sites. Although confidentiality and availability are not directly compromised, the integrity breach can facilitate subsequent attacks that may lead to credential theft or unauthorized actions within the mail environment. Organizations relying on Axigen WebMail expose their users to risks of targeted social engineering attacks, especially if attackers can deliver crafted emails with malicious image attachments. The vulnerability's exploitation requires user interaction, which somewhat limits mass exploitation but does not eliminate risk in environments with high email usage and less security awareness. The absence of known exploits in the wild suggests limited current threat activity, but the vulnerability remains a viable attack vector until patched. The impact is more significant in sectors where email is a critical communication tool and where Axigen WebMail is deployed, including enterprises, hosting providers, and service providers.

Mitigation Recommendations

To mitigate CVE-2024-25080, organizations should immediately upgrade Axigen WebMail to version 10.3.3.62 or later, where the vulnerability is addressed. In the absence of an immediate patch, administrators should consider disabling the image attachment viewer feature or restricting the types of attachments allowed in emails to reduce exposure. Implementing robust email filtering and attachment scanning can help detect and block malicious payloads before reaching users. User education on the risks of opening unexpected or suspicious attachments is critical to reduce the likelihood of exploitation. Additionally, deploying Content Security Policy (CSP) headers in the WebMail application can help mitigate the impact of XSS by restricting script execution sources. Monitoring WebMail logs for unusual activity and employing web application firewalls (WAFs) with XSS detection rules can provide additional layers of defense. Regular security assessments and penetration testing focused on webmail interfaces will help identify and remediate similar vulnerabilities proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-04T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d5fb7ef31ef0b570c75

Added to database: 2/25/2026, 9:45:03 PM

Last enriched: 2/26/2026, 10:29:14 AM

Last updated: 4/12/2026, 2:35:08 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses