CVE-2025-68643

Axigen Mail Server before 10.5.57 allows stored Cross-Site Scripting (XSS) in the handling of the timeFormat account preference parameter. Attackers can exploit this by deploying a multi-stage attack. In the first stage, a malicious JavaScript payload is injected into the timeFormat preference by exploiting a separate vulnerability or using compromised credentials. In the second stage, when the victim logs into the WebMail interface, the unsanitized timeFormat value is loaded from storage and inserted into the DOM, causing the injected script to execute.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:axigen:axigen_mail_server:*:*:*:*:*:*:*:*
cpe:2.3:a:axigen:axigen_mail_server:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-05 17:16

Updated : 2026-02-11 21:16


NVD link : CVE-2025-68643

Mitre link : CVE-2025-68643

CVE.ORG link : CVE-2025-68643


JSON object : View

Products Affected

axigen

  • axigen_mail_server
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')