Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68643: n/a

0
Medium
VulnerabilityCVE-2025-68643cvecve-2025-68643
Published: Thu Feb 05 2026 (02/05/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Axigen Mail Server before 10.5.57 allows stored Cross-Site Scripting (XSS) in the handling of the timeFormat account preference parameter. Attackers can exploit this by deploying a multi-stage attack. In the first stage, a malicious JavaScript payload is injected into the timeFormat preference by exploiting a separate vulnerability or using compromised credentials. In the second stage, when the victim logs into the WebMail interface, the unsanitized timeFormat value is loaded from storage and inserted into the DOM, causing the injected script to execute.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/13/2026, 06:54:28 UTC

Technical Analysis

CVE-2025-68643 is a stored Cross-Site Scripting (XSS) vulnerability affecting Axigen Mail Server versions prior to 10.5.57. The vulnerability is rooted in the handling of the timeFormat account preference parameter, which is not properly sanitized before being inserted into the Document Object Model (DOM) of the WebMail interface. An attacker can exploit this vulnerability through a multi-stage process. Initially, the attacker must inject a malicious JavaScript payload into the timeFormat preference. This injection can be achieved either by exploiting a separate vulnerability within the system or by leveraging compromised user credentials that allow modification of account preferences. Once the payload is stored, it remains dormant until the targeted user logs into the WebMail interface. At that point, the unsanitized timeFormat value is loaded and inserted into the DOM, causing the malicious script to execute in the context of the victim's browser session. This stored XSS can lead to unauthorized actions such as session hijacking, theft of sensitive information, or manipulation of the WebMail interface. The vulnerability requires network access, low attack complexity, and privileges to modify account preferences, with user interaction necessary to trigger the payload. The CVSS 3.1 base score is 5.4, indicating medium severity, with impacts on confidentiality and integrity but no direct availability impact. No patches are currently linked, and no known exploits have been reported in the wild, suggesting limited active exploitation at this time.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to confidentiality and integrity of email communications and user sessions. If exploited, attackers could hijack user sessions, steal sensitive email content, or perform unauthorized actions within the WebMail interface, potentially leading to data breaches or further lateral movement within the network. Organizations relying on Axigen Mail Server for critical communications may face reputational damage and compliance issues, especially under GDPR regulations concerning personal data protection. The requirement for attacker privileges or prior compromise reduces the likelihood of widespread exploitation but does not eliminate risk, particularly in environments with weak credential management or insufficient access controls. The absence of known exploits in the wild provides a window for proactive mitigation. However, the multi-stage nature of the attack means that attackers who have already gained some foothold could leverage this vulnerability to escalate their impact.

Mitigation Recommendations

European organizations should immediately verify their Axigen Mail Server versions and upgrade to 10.5.57 or later once patches are available. In the absence of an official patch, administrators should restrict access to account preference modification interfaces and enforce strong authentication mechanisms, including multi-factor authentication, to prevent unauthorized changes. Regularly audit account preferences for suspicious entries, particularly the timeFormat parameter. Implement Content Security Policy (CSP) headers in the WebMail interface to limit the execution of unauthorized scripts. Network segmentation and monitoring for unusual WebMail activity can help detect exploitation attempts. Additionally, educate users about phishing and credential security to reduce the risk of initial compromise. Organizations should also monitor threat intelligence feeds for any emerging exploits targeting this vulnerability and prepare incident response plans accordingly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-21T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6984c591f9fa50a62f2cfd3b

Added to database: 2/5/2026, 4:30:09 PM

Last enriched: 2/13/2026, 6:54:28 AM

Last updated: 3/21/2026, 11:20:40 AM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses