Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23619: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in GFI Software MailEssentials AI

0
Medium
VulnerabilityCVE-2026-23619cvecve-2026-23619cwe-79
Published: Thu Feb 19 2026 (02/19/2026, 18:00:09 UTC)
Source: CVE Database V5
Vendor/Project: GFI Software
Product: MailEssentials AI

Description

CVE-2026-23619 is a stored cross-site scripting (XSS) vulnerability affecting GFI Software's MailEssentials AI versions prior to 22. 4. The flaw exists in the Local Domains settings page where an authenticated user can inject malicious HTML or JavaScript via the txtDescription parameter. This input is stored and later rendered in the management interface, enabling script execution within the context of a logged-in administrator or user. Exploitation requires authentication and some user interaction, limiting the attack surface. The vulnerability has a CVSS 4. 0 base score of 5. 1, indicating medium severity. No known public exploits have been reported yet. Organizations using vulnerable versions of MailEssentials AI should prioritize patching or apply mitigations to prevent potential privilege escalation or session hijacking.

AI-Powered Analysis

AILast updated: 02/19/2026, 19:02:27 UTC

Technical Analysis

CVE-2026-23619 is a stored cross-site scripting vulnerability classified under CWE-79, found in GFI Software's MailEssentials AI product versions prior to 22.4. The vulnerability arises from improper neutralization of user-supplied input during web page generation on the Local Domains settings page. Specifically, an authenticated user can supply malicious HTML or JavaScript code through the ctl00$ContentPlaceHolder1$Pv3$txtDescription parameter on the /MailEssentials/pages/MailSecurity/general.aspx endpoint. This input is stored persistently and later rendered in the management interface without adequate sanitization or encoding, allowing the injected script to execute in the context of a logged-in user’s browser session. The vulnerability requires the attacker to have at least authenticated access to the management interface and some user interaction to trigger the malicious script. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), user interaction required (UI:P), and low impact on confidentiality and integrity but no impact on availability. This vulnerability could be leveraged to execute arbitrary scripts, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the management console. Although no known exploits are currently reported in the wild, the vulnerability poses a moderate risk to organizations using vulnerable versions of MailEssentials AI, especially those with multiple administrators or users accessing the management interface. The lack of a patch link suggests that remediation may require updating to version 22.4 or later once available.

Potential Impact

The primary impact of CVE-2026-23619 is the potential for attackers with authenticated access to execute arbitrary scripts within the management interface of MailEssentials AI. This can lead to session hijacking, allowing attackers to impersonate legitimate users or administrators, potentially gaining elevated privileges or unauthorized access to sensitive email security configurations. The vulnerability could also facilitate further attacks such as theft of credentials, manipulation of email filtering rules, or insertion of malicious content into email traffic. While the attack requires authentication and user interaction, the stored nature of the XSS increases the risk by persisting the malicious payload for repeated exploitation. Organizations relying on MailEssentials AI for email security may face increased risk of compromise, data leakage, or disruption of email security policies. The medium CVSS score reflects moderate severity, but the actual impact depends on the organization's user access controls and monitoring capabilities. If exploited in high-value environments, the vulnerability could contribute to broader network compromise or data breaches.

Mitigation Recommendations

To mitigate CVE-2026-23619, organizations should prioritize upgrading GFI MailEssentials AI to version 22.4 or later once the patch is released. Until then, implement strict access controls to limit authenticated user access to trusted personnel only, minimizing the risk of malicious input. Employ web application firewalls (WAFs) with rules to detect and block suspicious input patterns targeting the txtDescription parameter or similar fields. Conduct regular audits of user inputs in the Local Domains settings page and sanitize or remove any suspicious entries. Enable multi-factor authentication (MFA) for all users accessing the management interface to reduce the risk of compromised credentials. Educate administrators about the risks of XSS and encourage cautious behavior when interacting with user-generated content in the management console. Monitor logs for unusual activity or repeated access to the vulnerable page. Finally, implement Content Security Policy (CSP) headers if possible to restrict the execution of unauthorized scripts within the management interface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-14T16:02:29.335Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69975aafd7880ec89b287cbd

Added to database: 2/19/2026, 6:47:11 PM

Last enriched: 2/19/2026, 7:02:27 PM

Last updated: 2/19/2026, 9:00:52 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats