Cyber Posture

CVE-2026-27442

High

Published: 04 March 2026

Published
04 March 2026
Modified
05 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0002 4.5th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-27442 is a high-severity Path Traversal (CWE-22) vulnerability in Seppmail Seppmail. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 4.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-22

Validates pathnames and filenames to prevent traversal outside intended directories.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

Path traversal in the exposed GINA web interface directly enables T1190 (Exploit Public-Facing Application) for unauthenticated remote file access; the resulting arbitrary local file read maps to T1005 (Data from Local System) for collection of configuration or sensitive resources.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

The GINA web interface in SEPPmail Secure Email Gateway before version 15.0.1 does not properly check attachment filenames in GINA-encrypted emails, allowing an attacker to access files on the gateway.

Deeper analysisAI

CVE-2026-27442 is a path traversal vulnerability (CWE-22) in the GINA web interface of SEPPmail Secure Email Gateway versions prior to 15.0.1. The flaw arises from insufficient validation of attachment filenames in GINA-encrypted emails, which allows attackers to access arbitrary files on the gateway server. Published on 2026-03-04, it carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high confidentiality impact with network accessibility and no prerequisites for exploitation.

A remote, unauthenticated attacker can exploit this vulnerability by sending or submitting GINA-encrypted emails with specially crafted attachment filenames that traverse directory paths. No user interaction is required, and the low attack complexity enables straightforward exploitation over the network. Successful attacks grant read access to sensitive files on the gateway, such as configuration files or other system resources, without impacting integrity or availability.

The SEPPmail extended release notes for version 15.0, available at https://downloads.seppmail.com/extrelnotes/150/ERN15.0.html#seppmail-vulnerability-disclosure, disclose the vulnerability. Mitigation requires upgrading to SEPPmail Secure Email Gateway version 15.0.1 or later, which properly enforces attachment filename checks in the GINA web interface.

Details

CWE(s)

Affected Products

seppmail
seppmail
≤ 15.0.1

CVEs Like This One

CVE-2026-2743Same product: Seppmail Seppmail
CVE-2026-2747Same product: Seppmail Seppmail
CVE-2026-27443Same product: Seppmail Seppmail
CVE-2026-27441Same product: Seppmail Seppmail
CVE-2026-27444Same product: Seppmail Seppmail
CVE-2026-23536Shared CWE-22
CVE-2025-23422Shared CWE-22
CVE-2025-8343Shared CWE-22
CVE-2025-10559Shared CWE-22
CVE-2025-67076Shared CWE-22

References