Home

Description

HSC MailInspector 5.3.3-7 has a Path Traversal vulnerability due to improper validation of user-supplied input in the /tap/dw.php endpoint. The text parameter is used to construct file paths without adequate normalization or restriction to a safe base directory. A remote attacker can exploit this flaw to access arbitrary files on the underlying operating system, resulting in unauthorized disclosure of sensitive information.

PUBLISHED Reserved 2026-03-04 | Published 2026-05-18 | Updated 2026-05-19 | Assigner mitre

References

hsclabs.com/pt-br/mailinspector/

github.com/sql3t0/cve-disclosures

github.com/...main/02_-_CVE-2026-29963_LFI+Path_Traversal.md

cve.org (CVE-2026-29963)

nvd.nist.gov (CVE-2026-29963)

Download JSON