Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23621: CWE-203 Observable Discrepancy in GFI Software MailEssentials AI

0
Medium
VulnerabilityCVE-2026-23621cvecve-2026-23621cwe-203
Published: Thu Feb 19 2026 (02/19/2026, 18:01:03 UTC)
Source: CVE Database V5
Vendor/Project: GFI Software
Product: MailEssentials AI

Description

GFI MailEssentials AI versions prior to 22.4 contain an arbitrary directory existence enumeration vulnerability in the ListServer.IsPathExist() web method exposed at /MailEssentials/pages/MailSecurity/ListServer.aspx/IsPathExist. An authenticated user can supply an unrestricted filesystem path via the JSON key \"path\", which is URL-decoded and passed to Directory.Exists(), allowing the attacker to determine whether arbitrary directories exist on the server.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/07/2026, 21:28:40 UTC

Technical Analysis

CVE-2026-23621 is an arbitrary directory existence enumeration vulnerability identified in GFI Software's MailEssentials AI product versions prior to 22.4. The vulnerability exists in the ListServer.IsPathExist() web method exposed at /MailEssentials/pages/MailSecurity/ListServer.aspx/IsPathExist. This method accepts a JSON parameter named "path" which is URL-decoded and passed directly to the .NET Directory.Exists() function without proper validation or sanitization. An authenticated attacker with low privileges can supply arbitrary filesystem paths to this method and receive boolean responses indicating whether the specified directories exist on the server. This behavior constitutes a CWE-203 Observable Discrepancy vulnerability, where differences in system behavior reveal sensitive information. Although the vulnerability does not permit direct file access, modification, or code execution, it enables attackers to perform detailed reconnaissance of the server's filesystem structure. Such information can be leveraged to identify sensitive directories, configuration files, or potential attack vectors for subsequent exploitation. The vulnerability requires authentication but no user interaction, and the attack surface is limited to users with valid credentials. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the moderate impact and ease of exploitation. No patches or exploit code are currently publicly available, and no known exploits have been reported in the wild. The vulnerability affects all versions prior to 22.4, and organizations using these versions should prioritize remediation.

Potential Impact

The primary impact of CVE-2026-23621 is information disclosure through directory existence enumeration. By confirming the presence or absence of directories on the server, attackers can map the filesystem layout, identify sensitive or critical directories, and gather intelligence that facilitates more targeted and effective attacks such as privilege escalation, lateral movement, or exploitation of other vulnerabilities. While this vulnerability does not directly compromise confidentiality, integrity, or availability, it lowers the attacker's effort and increases the likelihood of successful follow-on attacks. For organizations relying on GFI MailEssentials AI for email security, this reconnaissance capability could be leveraged by insider threats or compromised accounts to gain insights into the server environment. The requirement for authentication limits exposure but does not eliminate risk, especially in environments with weak credential management or insider threats. The vulnerability could also be used in combination with other vulnerabilities to escalate impact. Overall, the threat is moderate but significant in environments where MailEssentials AI is deployed and trusted for critical email security functions.

Mitigation Recommendations

1. Upgrade to GFI MailEssentials AI version 22.4 or later once the vendor releases a patch addressing this vulnerability. 2. Until a patch is available, restrict access to the /MailEssentials/pages/MailSecurity/ListServer.aspx/IsPathExist endpoint by implementing strict access controls, such as IP whitelisting or network segmentation, to limit authenticated user access. 3. Enforce strong authentication mechanisms and monitor for unusual authentication attempts or access patterns to detect potential misuse. 4. Implement application-layer firewalls or Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests attempting to enumerate directories via the vulnerable method. 5. Conduct regular audits of user privileges to ensure that only necessary users have access to the MailEssentials AI management interfaces. 6. Monitor logs for repeated or anomalous calls to the IsPathExist method that could indicate reconnaissance activity. 7. Educate administrators and security teams about this vulnerability to ensure rapid response and mitigation. 8. Consider deploying intrusion detection systems (IDS) tuned to detect directory enumeration patterns targeting this endpoint. These measures combined will reduce the risk of exploitation and limit the information disclosure potential.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-14T16:02:29.336Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69975aafd7880ec89b287c73

Added to database: 2/19/2026, 6:47:11 PM

Last enriched: 3/7/2026, 9:28:40 PM

Last updated: 4/6/2026, 10:24:14 PM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses