Cyber Posture

CVE-2026-29133

Critical

Published: 02 April 2026

Published
02 April 2026
Modified
16 April 2026
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0006 18.2th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-29133 is a critical-severity Improper Input Validation (CWE-20) vulnerability in Seppmail Secure Email Gateway. Its CVSS base score is 9.1 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 18.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly enforces validation of PGP key UIDs to match associated email addresses during upload, addressing the core improper input validation (CWE-20) vulnerability.

prevent

Ensures timely identification, reporting, testing, and installation of software patches like SEPPmail 15.0.3 that remediate the PGP key UID mismatch flaw.

prevent

Requires identification and authentication for non-organizational users to access PGP key upload functionality, blocking unauthenticated network-based exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1553 Subvert Trust Controls Defense Impairment
Adversaries may undermine security controls that will either warn users of untrusted activity or prevent execution of untrusted programs.
Why these techniques?

Vulnerability in public-facing email gateway directly enables exploitation via T1190; improper UID validation bypasses key authenticity controls, mapping to T1553 for impersonation and encryption/signing subversion.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker to upload PGP keys with UIDs that do not match their email address.

Deeper analysisAI

CVE-2026-29133 is a vulnerability in SEPPmail Secure Email Gateway versions prior to 15.0.3 that allows an attacker to upload PGP keys with User IDs (UIDs) that do not match their associated email address. This issue stems from improper input validation (CWE-20) and has a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N), indicating critical severity due to high impacts on confidentiality and integrity with no availability disruption.

An unauthenticated attacker with network access can exploit this vulnerability with low complexity and no user interaction required. By uploading a malicious PGP key with a mismatched UID, the attacker can potentially impersonate legitimate users or bypass email encryption and signing verification mechanisms in the gateway, leading to unauthorized access to sensitive email content or injection of tampered messages.

The SEPPmail release notes for version 15.0.3, available at https://downloads.seppmail.com/extrelnotes/150/ERN15.0.html#seppmail-vulnerability-disclosure-1503, disclose this vulnerability and confirm that upgrading to version 15.0.3 mitigates the issue by enforcing proper UID validation during PGP key uploads.

Details

CWE(s)

Affected Products

seppmail
secure email gateway
≤ 15.0.3

CVEs Like This One

CVE-2026-29135Same product: Seppmail Secure Email Gateway
CVE-2026-29143Same product: Seppmail Secure Email Gateway
CVE-2026-29134Same product: Seppmail Secure Email Gateway
CVE-2026-29132Same product: Seppmail Secure Email Gateway
CVE-2026-29139Same product: Seppmail Secure Email Gateway
CVE-2026-29131Same product: Seppmail Secure Email Gateway
CVE-2026-29138Same product: Seppmail Secure Email Gateway
CVE-2026-27443Same vendor: Seppmail
CVE-2026-2743Same vendor: Seppmail
CVE-2026-2747Same vendor: Seppmail

References