Home

Description

MailEnable Enterprise Premium 10.55 and earlier contains an improper authorization vulnerability in the WebAdmin mobile portal that allows attackers to bypass authentication checks by reusing AuthenticationToken cookies generated for low-privileged users. Attackers can obtain a token from the WebMail login endpoint using the PersistentLogin parameter and replay it against the WebAdmin portal to perform highly privileged administrative actions.

PUBLISHED Reserved 2026-05-05 | Published 2026-05-08 | Updated 2026-05-08 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

HIGH: 8.1CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-639 Authorization Bypass Through User-Controlled Key

Product status

Default status
unaffected

Any version before 10.55
affected

Credits

dninh of SACOMBANK finder

References

www.mailenable.com/Premium-ReleaseNotes.txt release-notes

www.vulncheck.com/...emium-authorization-bypass-via-webadmin third-party-advisory

cve.org (CVE-2026-44400)

nvd.nist.gov (CVE-2026-44400)

Download JSON