Cyber Posture

CVE-2026-27443

High

Published: 04 March 2026

Published
04 March 2026
Modified
05 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS Score 0.0011 28.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-27443 is a high-severity Improper Input Validation (CWE-20) vulnerability in Seppmail Seppmail. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 28.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-20

Security testing and developer training directly verify and enforce proper input validation, reducing exploitability of injection and malformed-data weaknesses.

addresses: CWE-20

Security testing and evaluation at multiple SDLC stages directly detects missing or flawed input validation, with the required remediation process ensuring fixes are applied.

addresses: CWE-20

Directly implements checks on information inputs to reject invalid data before processing.

addresses: CWE-20

Spam protection mechanisms perform filtering and detection on inbound/outbound messages, directly compensating for missing or weak input validation of unsolicited content.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1672 Email Spoofing Stealth
Adversaries may fake, or spoof, a sender’s identity by modifying the value of relevant email headers in order to establish contact with victims under false pretenses.
Why these techniques?

The CVE describes remote exploitation of a public-facing email security gateway via crafted S/MIME emails (directly matching T1190). Successful exploitation enables header manipulation/spoofing that bypasses security controls and misleads recipients (directly matching T1672).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

SEPPmail Secure Email Gateway before version 15.0.1 does not properly sanitize the headers from S/MIME protected MIME entities, allowing an attacker to control trusted headers.

Deeper analysisAI

CVE-2026-27443 affects SEPPmail Secure Email Gateway versions prior to 15.0.1, where the software fails to properly sanitize headers from S/MIME protected MIME entities. This improper input validation (CWE-20) enables an attacker to manipulate trusted headers within these entities. The vulnerability carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N), indicating high severity due to its network accessibility, low attack complexity, and lack of required privileges or user interaction.

An unauthenticated attacker can exploit this vulnerability remotely by sending a specially crafted email containing S/MIME protected MIME entities with unsanitized headers. Successful exploitation allows the attacker to control trusted headers, resulting in high integrity impact without affecting confidentiality or availability. This could enable header spoofing or injection, potentially bypassing email security controls or misleading recipients and administrators.

The vendor's advisory in the release notes for version 15.0 at https://downloads.seppmail.com/extrelnotes/150/ERN15.0.html#seppmail-vulnerability-disclosure details the vulnerability disclosure and recommends upgrading to SEPPmail Secure Email Gateway 15.0.1 or later to mitigate the issue.

Details

CWE(s)

Affected Products

seppmail
seppmail
≤ 15.0.1

CVEs Like This One

CVE-2026-27444Same product: Seppmail Seppmail
CVE-2026-2743Same product: Seppmail Seppmail
CVE-2026-2747Same product: Seppmail Seppmail
CVE-2026-27442Same product: Seppmail Seppmail
CVE-2026-27441Same product: Seppmail Seppmail
CVE-2026-29135Same vendor: Seppmail
CVE-2026-29143Same vendor: Seppmail
CVE-2026-29133Same vendor: Seppmail
CVE-2026-29138Same vendor: Seppmail
CVE-2026-29134Same vendor: Seppmail

References