MailEnable Enterprise Premium 10.55 and earlier contains an improper authorization vulnerability in the WebAdmin mobile portal that allows attackers to bypass authentication checks by reusing AuthenticationToken cookies generated for low-privileged users. Attackers can obtain a token from the WebMail login endpoint using the PersistentLogin parameter and replay it against the WebAdmin portal to perform highly privileged administrative actions.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 08 May 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | MailEnable Enterprise Premium 10.55 and earlier contains an improper authorization vulnerability in the WebAdmin mobile portal that allows attackers to bypass authentication checks by reusing AuthenticationToken cookies generated for low-privileged users. Attackers can obtain a token from the WebMail login endpoint using the PersistentLogin parameter and replay it against the WebAdmin portal to perform highly privileged administrative actions. | |
| Title | MailEnable Enterprise Premium < 10.55 Authorization Bypass via WebAdmin | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-08T20:22:43.554Z
Reserved: 2026-05-05T21:38:43.137Z
Link: CVE-2026-44400
No data.
Status : Received
Published: 2026-05-08T21:16:28.260
Modified: 2026-05-08T21:16:28.260
Link: CVE-2026-44400
No data.
OpenCVE Enrichment
Updated: 2026-05-08T21:30:05Z
Weaknesses