Description
HSC MailInspector 5.3.3-7 has a Path Traversal vulnerability due to improper validation of user-supplied input in the /tap/dw.php endpoint. The text parameter is used to construct file paths without adequate normalization or restriction to a safe base directory. A remote attacker can exploit this flaw to access arbitrary files on the underlying operating system, resulting in unauthorized disclosure of sensitive information.
References
hsclabs.com/pt-br/mailinspector/
github.com/sql3t0/cve-disclosures
github.com/...main/02_-_CVE-2026-29963_LFI+Path_Traversal.md