Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23604: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in GFI Software MailEssentials AI

0
Medium
VulnerabilityCVE-2026-23604cvecve-2026-23604cwe-79
Published: Thu Feb 19 2026 (02/19/2026, 17:54:22 UTC)
Source: CVE Database V5
Vendor/Project: GFI Software
Product: MailEssentials AI

Description

GFI MailEssentials AI versions prior to 22.4 contain a stored cross-site scripting vulnerability in the Keyword Filtering rule creation workflow. An authenticated user can supply HTML/JavaScript in the ctl00$ContentPlaceHolder1$pv1$TXB_RuleName parameter to /MailEssentials/pages/MailSecurity/contentchecking.aspx, which is stored and later rendered in the management interface, allowing script execution in the context of a logged-in user.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/07/2026, 21:24:22 UTC

Technical Analysis

CVE-2026-23604 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79, affecting GFI Software's MailEssentials AI product versions prior to 22.4. The vulnerability exists in the Keyword Filtering rule creation workflow, specifically in the ctl00$ContentPlaceHolder1$pv1$TXB_RuleName parameter of the /MailEssentials/pages/MailSecurity/contentchecking.aspx page. An authenticated user can inject arbitrary HTML or JavaScript code into this parameter, which is then stored persistently and rendered later within the management interface. When a legitimate administrator or user accesses the affected interface, the malicious script executes in their browser context, potentially allowing session hijacking, credential theft, or unauthorized actions within the application. The attack requires the attacker to have authenticated access to the MailEssentials AI management console and some level of user interaction to trigger the payload. The vulnerability does not require elevated privileges beyond authentication, but the impact is limited to users with access to the management interface. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required beyond authentication, and user interaction required, with limited confidentiality and integrity impact. No public exploits or active exploitation have been reported to date. The vulnerability highlights insufficient input sanitization and output encoding in the web application’s rule creation workflow, a common issue in web applications that handle user-generated content. Remediation involves patching to a fixed version or implementing strict input validation and output encoding to neutralize malicious scripts.

Potential Impact

The primary impact of this vulnerability is on the confidentiality and integrity of the MailEssentials AI management environment. Successful exploitation could allow an authenticated attacker to execute arbitrary scripts in the context of other logged-in administrators or users, potentially leading to session hijacking, theft of sensitive configuration data, or unauthorized changes to email filtering rules. This could degrade the effectiveness of email security controls, allowing phishing, malware, or spam to bypass defenses. While availability impact is minimal, the compromise of administrative interfaces can have cascading effects on organizational security posture. Organizations relying on GFI MailEssentials AI for email security may face increased risk of targeted attacks against their email infrastructure. The requirement for authentication and user interaction limits the scope to insider threats or compromised credentials but does not eliminate risk. The vulnerability could be leveraged in multi-stage attacks to escalate privileges or move laterally within networks. Given the widespread use of email security products in enterprises worldwide, the impact could be significant if exploited at scale.

Mitigation Recommendations

Organizations should immediately verify their MailEssentials AI version and upgrade to version 22.4 or later where the vulnerability is fixed. If patching is not immediately feasible, implement strict input validation on the RuleName parameter to reject or sanitize HTML and JavaScript content. Employ output encoding techniques to ensure any user-supplied input is safely rendered without executing scripts. Restrict access to the management interface to trusted administrators only, using network segmentation and strong authentication mechanisms such as multi-factor authentication (MFA). Monitor logs for unusual activity related to rule creation or modification. Conduct regular security awareness training to reduce the risk of credential compromise. Consider deploying web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting the vulnerable parameter. Finally, review and harden overall email security policies and incident response plans to quickly detect and respond to potential exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-14T16:02:29.333Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69975aafd7880ec89b287c77

Added to database: 2/19/2026, 6:47:11 PM

Last enriched: 3/7/2026, 9:24:22 PM

Last updated: 4/3/2026, 5:50:45 AM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses