CVE-2026-32850

MailEnable versions prior to 10.55 contain a reflected cross-site scripting vulnerability in the webmail interface that allows remote attackers to execute arbitrary JavaScript in a victim's browser by crafting a malicious URL. Attackers can inject malicious code through the SelectedIndex parameter in the ManageShares.aspx form, which is not properly sanitized before being embedded into dynamically generated JavaScript.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mailenable:mailenable:*:*:*:*:standard:*:*:*

History

30 Mar 2026, 14:34

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
First Time Mailenable
Mailenable mailenable
CPE cpe:2.3:a:mailenable:mailenable:*:*:*:*:standard:*:*:*
References () https://karmainsecurity.com/KIS-2026-05 - () https://karmainsecurity.com/KIS-2026-05 - Exploit, Third Party Advisory
References () https://mailenable.com/Standard-ReleaseNotes.txt - () https://mailenable.com/Standard-ReleaseNotes.txt - Release Notes
References () https://www.mailenable.com/ - () https://www.mailenable.com/ - Product
References () https://www.mailenable.com/rss/article.asp?Source=RSSADMIN&ID=MAILENABLEVERSION1055 - () https://www.mailenable.com/rss/article.asp?Source=RSSADMIN&ID=MAILENABLEVERSION1055 - Release Notes
References () https://www.vulncheck.com/advisories/mailenable-reflected-xss-via-manageshares-aspx-selectedindex-parameter - () https://www.vulncheck.com/advisories/mailenable-reflected-xss-via-manageshares-aspx-selectedindex-parameter - Third Party Advisory

Information

Published : 2026-03-23 20:16

Updated : 2026-03-30 14:34


NVD link : CVE-2026-32850

Mitre link : CVE-2026-32850

CVE.ORG link : CVE-2026-32850


JSON object : View

Products Affected

mailenable

  • mailenable
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')