CVE-2025-68722: n/a
Axigen Mail Server before 10.5.57 and 10.6.x before 10.6.26 contains a Cross-Site Request Forgery (CSRF) vulnerability in the WebAdmin interface through improper handling of the _s (breadcrumb) parameter. The application accepts state-changing requests via the GET method and automatically processes base64-encoded commands queued in the _s parameter immediately after administrator authentication. Attackers can craft malicious URLs that, when clicked by administrators, execute arbitrary administrative actions upon login without further user interaction, including creating rogue administrator accounts or modifying critical server configurations.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-68722 affects Axigen Mail Server versions prior to 10.5.57 and 10.6.x before 10.6.26. It is a Cross-Site Request Forgery (CSRF) issue located in the WebAdmin interface, specifically related to the improper handling of the _s parameter, which functions as a breadcrumb mechanism. The WebAdmin interface accepts state-changing requests via the HTTP GET method, which is unusual and insecure for such operations. The _s parameter can carry base64-encoded commands that the server processes immediately after an administrator successfully authenticates. This design flaw allows an attacker to craft a malicious URL embedding these encoded commands. If an administrator clicks this URL, the server executes the commands without requiring additional user interaction or authentication steps. Potential malicious actions include creating unauthorized administrator accounts and modifying critical server configurations, which could lead to full system compromise. The vulnerability is classified under CWE-352 (Cross-Site Request Forgery). The CVSS v3.1 base score is 8.8, indicating high severity, with attack vector Network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been reported, the vulnerability's characteristics make it a significant risk for organizations relying on affected Axigen Mail Server versions.
Potential Impact
The impact of CVE-2025-68722 is substantial for organizations using vulnerable Axigen Mail Server versions. Successful exploitation allows attackers to perform arbitrary administrative actions remotely by tricking administrators into clicking malicious URLs. This can lead to unauthorized creation of administrator accounts, enabling persistent and stealthy access to the mail server. Attackers can also modify critical server configurations, potentially disrupting mail services, intercepting or altering email communications, and compromising sensitive data. The breach of administrative control undermines the confidentiality, integrity, and availability of the mail infrastructure, which is often a critical communication backbone for organizations. This can result in operational disruptions, data breaches, regulatory non-compliance, and reputational damage. Given the network-exploitable nature and lack of required privileges, the threat is relevant to any organization exposing the WebAdmin interface to internal or external networks.
Mitigation Recommendations
To mitigate CVE-2025-68722, organizations should urgently upgrade Axigen Mail Server to versions 10.5.57 or later, or 10.6.26 or later, where the vulnerability is patched. If immediate patching is not feasible, restrict access to the WebAdmin interface using network-level controls such as VPNs, IP whitelisting, or firewall rules to limit exposure to trusted administrators only. Implement multi-factor authentication (MFA) for administrator accounts to reduce the risk of unauthorized access. Administrators should be trained to avoid clicking on suspicious or unsolicited URLs, especially those targeting the WebAdmin interface. Additionally, monitoring and logging administrative actions can help detect anomalous activities indicative of exploitation attempts. Consider disabling or limiting the use of GET requests for state-changing operations if configurable. Regularly audit administrator accounts and server configurations for unauthorized changes. Finally, maintain up-to-date backups of configurations and data to enable recovery in case of compromise.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Japan, South Korea, India, Brazil, Netherlands, Switzerland
CVE-2025-68722: n/a
Description
Axigen Mail Server before 10.5.57 and 10.6.x before 10.6.26 contains a Cross-Site Request Forgery (CSRF) vulnerability in the WebAdmin interface through improper handling of the _s (breadcrumb) parameter. The application accepts state-changing requests via the GET method and automatically processes base64-encoded commands queued in the _s parameter immediately after administrator authentication. Attackers can craft malicious URLs that, when clicked by administrators, execute arbitrary administrative actions upon login without further user interaction, including creating rogue administrator accounts or modifying critical server configurations.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2025-68722 affects Axigen Mail Server versions prior to 10.5.57 and 10.6.x before 10.6.26. It is a Cross-Site Request Forgery (CSRF) issue located in the WebAdmin interface, specifically related to the improper handling of the _s parameter, which functions as a breadcrumb mechanism. The WebAdmin interface accepts state-changing requests via the HTTP GET method, which is unusual and insecure for such operations. The _s parameter can carry base64-encoded commands that the server processes immediately after an administrator successfully authenticates. This design flaw allows an attacker to craft a malicious URL embedding these encoded commands. If an administrator clicks this URL, the server executes the commands without requiring additional user interaction or authentication steps. Potential malicious actions include creating unauthorized administrator accounts and modifying critical server configurations, which could lead to full system compromise. The vulnerability is classified under CWE-352 (Cross-Site Request Forgery). The CVSS v3.1 base score is 8.8, indicating high severity, with attack vector Network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been reported, the vulnerability's characteristics make it a significant risk for organizations relying on affected Axigen Mail Server versions.
Potential Impact
The impact of CVE-2025-68722 is substantial for organizations using vulnerable Axigen Mail Server versions. Successful exploitation allows attackers to perform arbitrary administrative actions remotely by tricking administrators into clicking malicious URLs. This can lead to unauthorized creation of administrator accounts, enabling persistent and stealthy access to the mail server. Attackers can also modify critical server configurations, potentially disrupting mail services, intercepting or altering email communications, and compromising sensitive data. The breach of administrative control undermines the confidentiality, integrity, and availability of the mail infrastructure, which is often a critical communication backbone for organizations. This can result in operational disruptions, data breaches, regulatory non-compliance, and reputational damage. Given the network-exploitable nature and lack of required privileges, the threat is relevant to any organization exposing the WebAdmin interface to internal or external networks.
Mitigation Recommendations
To mitigate CVE-2025-68722, organizations should urgently upgrade Axigen Mail Server to versions 10.5.57 or later, or 10.6.26 or later, where the vulnerability is patched. If immediate patching is not feasible, restrict access to the WebAdmin interface using network-level controls such as VPNs, IP whitelisting, or firewall rules to limit exposure to trusted administrators only. Implement multi-factor authentication (MFA) for administrator accounts to reduce the risk of unauthorized access. Administrators should be trained to avoid clicking on suspicious or unsolicited URLs, especially those targeting the WebAdmin interface. Additionally, monitoring and logging administrative actions can help detect anomalous activities indicative of exploitation attempts. Consider disabling or limiting the use of GET requests for state-changing operations if configurable. Regularly audit administrator accounts and server configurations for unauthorized changes. Finally, maintain up-to-date backups of configurations and data to enable recovery in case of compromise.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-12-24T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6984c20ef9fa50a62f2c40b5
Added to database: 2/5/2026, 4:15:10 PM
Last enriched: 2/20/2026, 9:07:49 AM
Last updated: 3/22/2026, 10:38:58 PM
Views: 73
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.