Home

Description

MailEnable versions prior to 10.54 contain an unsafe DLL loading vulnerability that can lead to local arbitrary code execution. The MailEnable administrative executable attempts to load MEAISM.DLL from its installation directory without sufficient integrity validation or a secure search order. A local attacker with write access to that directory can plant a malicious MEAISM.DLL, which is then loaded when the executable starts, resulting in execution of attacker-controlled code with the privileges of the process.

PUBLISHED Reserved 2025-04-15 | Published 2025-12-10 | Updated 2025-12-10 | Assigner VulnCheck




HIGH: 8.5CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-427 Uncontrolled Search Path Element

Product status

Default status
unaffected

Any version before 10.54
affected

Credits

MushroomSecTeam (Spotify, AmirSUN, M30Brad, Hannah Green, av01t3x, PG) finder

References

mailenable.com/Standard-ReleaseNotes.txt release-notes patch

www.mailenable.com/ product

www.vulncheck.com/...acking-via-unsafe-loading-of-meaism-dll third-party-advisory

cve.org (CVE-2025-34419)

nvd.nist.gov (CVE-2025-34419)

Download JSON