Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68721: n/a

0
High
VulnerabilityCVE-2025-68721cvecve-2025-68721
Published: Thu Feb 05 2026 (02/05/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Axigen Mail Server before 10.5.57 contains an improper access control vulnerability in the WebAdmin interface. A delegated admin account with zero permissions can bypass access control checks and gain unauthorized access to the SSL Certificates management endpoint (page=sslcerts). This allows the attacker to view, download, upload, and delete SSL certificate files, despite lacking the necessary privileges to access the Security & Filtering section.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/20/2026, 09:07:35 UTC

Technical Analysis

CVE-2025-68721 is an improper access control vulnerability identified in Axigen Mail Server versions prior to 10.5.57, specifically affecting the WebAdmin interface. The flaw allows delegated administrator accounts, even those configured with zero permissions, to bypass intended access control mechanisms and gain unauthorized access to the SSL Certificates management endpoint (page=sslcerts). This endpoint controls critical SSL certificate files used to secure communications. Exploiting this vulnerability enables an attacker to view, download, upload, and delete SSL certificates, actions normally restricted to privileged administrators. The vulnerability stems from inadequate enforcement of permission checks (CWE-284) within the WebAdmin interface. The CVSS v3.1 base score is 8.1 (high severity), reflecting network exploitability (AV:N), low attack complexity (AC:L), requiring delegated privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality and integrity (C:H/I:H) but no impact on availability (A:N). While no public exploits are currently known, the ability to manipulate SSL certificates could allow attackers to impersonate mail servers, intercept encrypted communications, or disrupt secure email operations. The vulnerability affects all deployments running vulnerable versions of Axigen Mail Server with WebAdmin enabled and delegated admin accounts configured. The lack of a patch link suggests that remediation may require upgrading to version 10.5.57 or later once available or applying vendor guidance to restrict access.

Potential Impact

The vulnerability poses a significant risk to organizations relying on Axigen Mail Server for email communications. Unauthorized access to SSL certificates compromises the confidentiality and integrity of encrypted communications, potentially enabling man-in-the-middle attacks, interception of sensitive email data, and impersonation of mail servers. Attackers could also disrupt secure email operations by deleting or replacing certificates, leading to service outages or degraded trust. Since delegated admin accounts with zero permissions can exploit this flaw, insider threats or compromised low-privilege accounts become more dangerous. The impact extends to any organization using Axigen Mail Server, including enterprises, government agencies, and service providers, especially those handling sensitive or regulated data. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits. The vulnerability could also undermine organizational compliance with security standards requiring proper certificate management.

Mitigation Recommendations

Organizations should immediately verify if they are running Axigen Mail Server versions prior to 10.5.57 and assess the configuration of delegated admin accounts. Until a patch or update is applied, restrict access to the WebAdmin interface to trusted networks and personnel only, using network-level controls such as VPNs, firewalls, or IP whitelisting. Review and minimize the number of delegated admin accounts, especially those with zero or minimal permissions, and monitor their activity closely. Implement strong authentication and logging for all administrative access. If possible, disable or limit the SSL Certificates management functionality for delegated admins. Stay in contact with Axigen for official patches or security advisories and apply updates promptly once available. Conduct regular audits of SSL certificates to detect unauthorized changes. Consider deploying intrusion detection systems to monitor for suspicious WebAdmin access patterns. Finally, educate administrators about the risks of delegated accounts and enforce the principle of least privilege.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-24T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6984c20ef9fa50a62f2c40b1

Added to database: 2/5/2026, 4:15:10 PM

Last enriched: 2/20/2026, 9:07:35 AM

Last updated: 3/22/2026, 1:59:03 AM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses