Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23619: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in GFI Software MailEssentials AI

0
Medium
VulnerabilityCVE-2026-23619cvecve-2026-23619cwe-79
Published: Thu Feb 19 2026 (02/19/2026, 18:00:09 UTC)
Source: CVE Database V5
Vendor/Project: GFI Software
Product: MailEssentials AI

Description

GFI MailEssentials AI versions prior to 22.4 contain a stored cross-site scripting vulnerability in the Local Domains settings page. An authenticated user can supply HTML/JavaScript in the ctl00$ContentPlaceHolder1$Pv3$txtDescription parameter to /MailEssentials/pages/MailSecurity/general.aspx, which is stored and later rendered in the management interface, allowing script execution in the context of a logged-in user.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/07/2026, 21:28:10 UTC

Technical Analysis

CVE-2026-23619 is a stored cross-site scripting (XSS) vulnerability identified in GFI Software's MailEssentials AI product, specifically affecting versions prior to 22.4. The vulnerability resides in the Local Domains settings page, where the parameter ctl00$ContentPlaceHolder1$Pv3$txtDescription accepts user input that is not properly sanitized or neutralized before being stored and subsequently rendered in the management interface. An authenticated user with access to this page can inject malicious HTML or JavaScript code, which is then executed in the browser context of any administrator or user viewing the affected interface. This improper neutralization of input corresponds to CWE-79, a common web security weakness. The vulnerability requires the attacker to have authenticated access to the system, but no elevated privileges beyond that are explicitly required. Exploitation does not require complex attack vectors or advanced user interaction beyond submitting crafted input. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L - low privileges), and user interaction required (UI:P). The impact on confidentiality and integrity is limited but can allow attackers to hijack sessions, perform unauthorized actions, or pivot within the management console. No public exploits are currently known, and no official patches are listed yet, though version 22.4 presumably addresses the issue. The vulnerability affects the web management interface, a critical component for email security administration, making it a significant risk for organizations relying on this product for email threat protection.

Potential Impact

The impact of CVE-2026-23619 is primarily on the confidentiality and integrity of the management interface of GFI MailEssentials AI. Successful exploitation allows an authenticated attacker to execute arbitrary scripts in the context of other logged-in users, potentially leading to session hijacking, theft of credentials, unauthorized configuration changes, or deployment of further attacks within the environment. This can undermine the security posture of the email filtering and protection system, potentially allowing malicious emails or payloads to bypass defenses if the attacker modifies settings. While availability impact is limited, the compromise of the management interface can have cascading effects on organizational email security. Given the product's role in enterprise email security, exploitation could affect sensitive communications and increase the risk of phishing or malware delivery. The requirement for authentication limits the attack surface but does not eliminate risk, especially in environments with multiple administrators or where credential compromise is possible. Organizations worldwide using GFI MailEssentials AI in their email security infrastructure face potential exposure, particularly if they have not updated to version 22.4 or later.

Mitigation Recommendations

To mitigate CVE-2026-23619, organizations should prioritize upgrading GFI MailEssentials AI to version 22.4 or later, where the vulnerability is addressed. In the absence of an immediate patch, administrators should restrict access to the management interface to trusted networks and users only, employing network segmentation and strong authentication controls such as multi-factor authentication (MFA). Review and audit user accounts with access to the Local Domains settings page to ensure only necessary personnel have permissions. Implement web application firewall (WAF) rules to detect and block suspicious input patterns targeting the vulnerable parameter. Regularly monitor logs for unusual activity or attempts to inject scripts. Educate administrators on the risks of XSS and the importance of cautious input handling. Additionally, consider isolating the management interface from general user networks and enforcing strict session management policies to reduce the impact of potential session hijacking. Finally, maintain up-to-date backups and incident response plans to quickly recover from any compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-14T16:02:29.335Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69975aafd7880ec89b287cbd

Added to database: 2/19/2026, 6:47:11 PM

Last enriched: 3/7/2026, 9:28:10 PM

Last updated: 4/5/2026, 2:37:17 AM

Views: 97

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses