Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-55196: n/a

0
High
VulnerabilityCVE-2024-55196cvecve-2024-55196
Published: Thu Dec 19 2024 (12/19/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Insufficiently Protected Credentials in the Mail Server Configuration in GoPhish v0.12.1 allows an attacker to access cleartext passwords for the configured IMAP and SMTP servers.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 23:47:58 UTC

Technical Analysis

CVE-2024-55196 identifies a vulnerability in GoPhish version 0.12.1 related to insufficient protection of credentials used for configuring IMAP and SMTP mail servers. Specifically, the application stores these credentials in cleartext within its configuration, violating secure storage best practices and exposing sensitive authentication data. This vulnerability is classified under CWE-312, which concerns the storage of sensitive information in an insecure manner. The CVSS 3.1 base score of 7.5 reflects a high severity due to the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is primarily on confidentiality (C:H), with no direct effect on integrity or availability. An attacker who can access the GoPhish server or intercept configuration files can retrieve the cleartext credentials for the mail servers, potentially enabling unauthorized email access or manipulation. Although no exploits are currently known in the wild, the vulnerability poses a significant risk given the sensitive nature of email credentials and the role of GoPhish in phishing simulations, which often involve real mail infrastructure. The lack of available patches at the time of publication necessitates immediate attention to configuration management and access controls to mitigate risk.

Potential Impact

The primary impact of CVE-2024-55196 is the compromise of confidentiality through exposure of cleartext credentials for IMAP and SMTP servers configured in GoPhish. Attackers gaining these credentials can access mail servers, potentially intercepting, sending, or manipulating emails. This can facilitate further phishing attacks, data breaches, or unauthorized access to sensitive communications. Since GoPhish is widely used for phishing simulations, attackers could leverage compromised credentials to undermine organizational security awareness programs or escalate attacks. The vulnerability does not directly affect system integrity or availability but can indirectly lead to reputational damage, regulatory penalties, and operational disruptions if email systems are abused. Organizations relying on GoPhish for security testing or email infrastructure should consider this a critical risk to their email security posture.

Mitigation Recommendations

1. Immediately restrict access to GoPhish configuration files to authorized personnel only, using strict file system permissions and access controls. 2. Avoid storing mail server credentials in cleartext; if possible, use environment variables or secure vault solutions to manage sensitive configuration data. 3. Monitor and audit access logs for GoPhish servers and mail servers to detect unauthorized access attempts. 4. Implement network segmentation to limit exposure of GoPhish servers and mail infrastructure to trusted networks only. 5. Regularly update GoPhish to newer versions once patches addressing this vulnerability are released. 6. Consider encrypting configuration files or using application-level encryption for sensitive data. 7. Educate administrators on secure credential management practices and the risks of cleartext storage. 8. If credentials are suspected compromised, rotate passwords immediately and review mail server access for suspicious activity.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-12-06T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bccb7ef31ef0b55b076

Added to database: 2/25/2026, 9:38:20 PM

Last enriched: 2/27/2026, 11:47:58 PM

Last updated: 4/12/2026, 6:48:55 PM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses