CVE-2026-27442
Published: 04 March 2026
Summary
CVE-2026-27442 is a high-severity Path Traversal (CWE-22) vulnerability in Seppmail Seppmail. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 4.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Validates pathnames and filenames to prevent traversal outside intended directories.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal in the exposed GINA web interface directly enables T1190 (Exploit Public-Facing Application) for unauthenticated remote file access; the resulting arbitrary local file read maps to T1005 (Data from Local System) for collection of configuration or sensitive resources.
NVD Description
The GINA web interface in SEPPmail Secure Email Gateway before version 15.0.1 does not properly check attachment filenames in GINA-encrypted emails, allowing an attacker to access files on the gateway.
Deeper analysisAI
CVE-2026-27442 is a path traversal vulnerability (CWE-22) in the GINA web interface of SEPPmail Secure Email Gateway versions prior to 15.0.1. The flaw arises from insufficient validation of attachment filenames in GINA-encrypted emails, which allows attackers to access arbitrary files on the gateway server. Published on 2026-03-04, it carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high confidentiality impact with network accessibility and no prerequisites for exploitation.
A remote, unauthenticated attacker can exploit this vulnerability by sending or submitting GINA-encrypted emails with specially crafted attachment filenames that traverse directory paths. No user interaction is required, and the low attack complexity enables straightforward exploitation over the network. Successful attacks grant read access to sensitive files on the gateway, such as configuration files or other system resources, without impacting integrity or availability.
The SEPPmail extended release notes for version 15.0, available at https://downloads.seppmail.com/extrelnotes/150/ERN15.0.html#seppmail-vulnerability-disclosure, disclose the vulnerability. Mitigation requires upgrading to SEPPmail Secure Email Gateway version 15.0.1 or later, which properly enforces attachment filename checks in the GINA web interface.
Details
- CWE(s)